={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1338.691030][ T3584] device bridge_slave_0 left promiscuous mode [ 1338.697245][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.824121][ T3584] device hsr_slave_0 left promiscuous mode [ 1338.840964][ T3584] device hsr_slave_1 left promiscuous mode [ 1338.860124][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1338.892057][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1339.352604][ T3584] device bridge_slave_1 left promiscuous mode [ 1339.359176][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.376606][ T3584] device bridge_slave_0 left promiscuous mode [ 1339.382925][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state [ 1339.424380][ T3584] device hsr_slave_0 left promiscuous mode [ 1339.440418][ T3584] device hsr_slave_1 left promiscuous mode 03:56:20 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1339.607498][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1339.762350][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1339.973455][ T3584] device bridge_slave_1 left promiscuous mode [ 1339.979656][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1340.197760][ T3584] device bridge_slave_0 left promiscuous mode [ 1340.226647][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state 03:56:21 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x0, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1340.865258][ T3584] device hsr_slave_0 left promiscuous mode 03:56:22 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x0, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1341.027062][ T3584] device hsr_slave_1 left promiscuous mode 03:56:22 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x0, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1341.380882][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1341.388408][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1341.621201][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1341.628687][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1341.792678][ T3584] device bridge_slave_1 left promiscuous mode [ 1341.798873][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1341.924418][ T3584] device bridge_slave_0 left promiscuous mode [ 1341.934186][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state 03:56:23 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x0, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1342.755747][ T3584] device hsr_slave_0 left promiscuous mode [ 1342.817230][ T3584] device hsr_slave_1 left promiscuous mode [ 1342.827832][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1342.847392][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1342.866929][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1342.880159][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1342.929673][ T3584] device bridge_slave_1 left promiscuous mode [ 1342.941401][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.019655][ T3584] device bridge_slave_0 left promiscuous mode [ 1343.028461][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.051052][ T3584] device hsr_slave_0 left promiscuous mode [ 1343.062951][ T3584] device hsr_slave_1 left promiscuous mode [ 1343.076496][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1343.092550][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1343.106337][ T3584] device bridge_slave_1 left promiscuous mode [ 1343.117771][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.132078][ T3584] device bridge_slave_0 left promiscuous mode [ 1343.138240][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.243424][ T3584] device hsr_slave_0 left promiscuous mode [ 1343.411725][ T3584] device hsr_slave_1 left promiscuous mode [ 1343.592765][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1343.610283][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 03:56:24 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x0, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1344.128546][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1344.143595][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1344.208401][ T3584] device bridge_slave_1 left promiscuous mode [ 1344.219189][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state 03:56:25 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x0, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1344.360816][ T3584] device bridge_slave_0 left promiscuous mode [ 1344.367038][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.405567][ T3584] device hsr_slave_0 left promiscuous mode [ 1344.420650][ T3584] device hsr_slave_1 left promiscuous mode [ 1344.650196][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1344.884673][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1344.962806][ T3584] device bridge_slave_1 left promiscuous mode [ 1344.968992][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state 03:56:26 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x0, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1345.322062][ T3584] device bridge_slave_0 left promiscuous mode [ 1345.328279][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state 03:56:26 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x0, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1346.117634][ T3584] device hsr_slave_0 left promiscuous mode [ 1346.349264][ T3584] device hsr_slave_1 left promiscuous mode 03:56:27 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x0, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1346.498255][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1346.732290][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1346.934492][ T3584] device bridge_slave_1 left promiscuous mode [ 1346.950100][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1347.093776][ T3584] device bridge_slave_0 left promiscuous mode [ 1347.104544][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state 03:56:28 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:29 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1348.310421][ T3584] device hsr_slave_0 left promiscuous mode [ 1348.760168][ T3584] device hsr_slave_1 left promiscuous mode 03:56:30 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1348.875958][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1348.900215][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1349.077339][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1349.090153][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 03:56:30 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1349.427803][ T3584] device bridge_slave_1 left promiscuous mode [ 1349.450286][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1349.473242][ T3584] device bridge_slave_0 left promiscuous mode [ 1349.500362][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state [ 1350.080178][ T3584] device hsr_slave_0 left promiscuous mode 03:56:31 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1350.490063][ T3584] device hsr_slave_1 left promiscuous mode [ 1350.825484][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1350.838465][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_0 03:56:32 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1350.925810][ T3584] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1350.941053][ T3584] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1351.084426][ T3584] device bridge_slave_1 left promiscuous mode [ 1351.100084][ T3584] bridge0: port 2(bridge_slave_1) entered disabled state [ 1351.238002][ T3584] device bridge_slave_0 left promiscuous mode [ 1351.248218][ T3584] bridge0: port 1(bridge_slave_0) entered disabled state 03:56:32 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:32 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1351.800432][T19510] Bluetooth: hci5: command 0x0409 tx timeout [ 1351.893961][ T3584] device veth1_macvtap left promiscuous mode [ 1351.910511][ T3584] device veth0_macvtap left promiscuous mode [ 1351.916582][ T3584] device veth1_vlan left promiscuous mode [ 1351.930051][ T3584] device veth0_vlan left promiscuous mode 03:56:33 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1353.163870][ T3584] device veth1_macvtap left promiscuous mode [ 1353.169965][ T3584] device veth0_macvtap left promiscuous mode [ 1353.206888][ T3584] device veth1_vlan left promiscuous mode [ 1353.212734][ T3584] device veth0_vlan left promiscuous mode [ 1353.391426][ T3584] device veth1_macvtap left promiscuous mode [ 1353.397472][ T3584] device veth0_macvtap left promiscuous mode [ 1353.414009][ T3584] device veth1_vlan left promiscuous mode [ 1353.427402][ T3584] device veth0_vlan left promiscuous mode [ 1353.880134][T19510] Bluetooth: hci5: command 0x041b tx timeout 03:56:35 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x0, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1354.247712][ T3584] device veth1_macvtap left promiscuous mode [ 1354.260632][ T3584] device veth0_macvtap left promiscuous mode [ 1354.266723][ T3584] device veth1_vlan left promiscuous mode 03:56:35 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x0, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1354.294266][ T3584] device veth0_vlan left promiscuous mode [ 1354.522464][ T3584] device veth1_macvtap left promiscuous mode [ 1354.528551][ T3584] device veth0_macvtap left promiscuous mode [ 1354.543372][ T3584] device veth1_vlan left promiscuous mode [ 1354.549177][ T3584] device veth0_vlan left promiscuous mode [ 1354.572814][ T3584] device veth1_macvtap left promiscuous mode [ 1354.578856][ T3584] device veth0_macvtap left promiscuous mode [ 1354.595540][ T3584] device veth1_vlan left promiscuous mode [ 1354.610392][ T3584] device veth0_vlan left promiscuous mode [ 1354.624002][ T3584] device veth1_macvtap left promiscuous mode [ 1354.642927][ T3584] device veth0_macvtap left promiscuous mode [ 1354.648996][ T3584] device veth1_vlan left promiscuous mode [ 1354.656524][ T3584] device veth0_vlan left promiscuous mode 03:56:36 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x0, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1355.960173][T21387] Bluetooth: hci5: command 0x040f tx timeout 03:56:37 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x0, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:38 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x0, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:38 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x0, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1358.040299][T21387] Bluetooth: hci5: command 0x0419 tx timeout 03:56:39 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:39 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:40 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:41 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:41 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:42 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1361.332272][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.338572][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 03:56:43 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r8, 0x400454c8, 0x1) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r9, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r9}, &(0x7f0000000f80), &(0x7f0000000fc0)=r9}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:44 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r8, 0x400454c8, 0x1) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r9, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r9}, &(0x7f0000000f80), &(0x7f0000000fc0)=r9}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:45 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r8, 0x400454c8, 0x1) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r9, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r9}, &(0x7f0000000f80), &(0x7f0000000fc0)=r9}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:46 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:47 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:48 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:48 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1368.280269][T19510] Bluetooth: hci6: command 0x0409 tx timeout [ 1368.440297][T10767] Bluetooth: hci7: command 0x0409 tx timeout 03:56:50 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1370.370219][T22717] Bluetooth: hci6: command 0x041b tx timeout 03:56:51 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1370.530328][T22717] Bluetooth: hci7: command 0x041b tx timeout 03:56:52 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:53 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1372.450533][T22717] Bluetooth: hci6: command 0x040f tx timeout [ 1372.610431][T22717] Bluetooth: hci7: command 0x040f tx timeout 03:56:54 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:55 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x3, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:55 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x3, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1374.530486][T22717] Bluetooth: hci6: command 0x0419 tx timeout [ 1374.690343][T22717] Bluetooth: hci7: command 0x0419 tx timeout 03:56:55 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x3, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:56 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:57 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:58 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:56:59 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, 0x0, 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:00 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, 0x0, 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:02 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, 0x0, 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:02 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:03 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:04 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:05 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:05 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:06 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:07 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x0, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:08 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x0, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:08 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x0, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1387.730287][T22717] Bluetooth: hci8: command 0x0409 tx timeout 03:57:08 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x0, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:09 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x0, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:09 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x0, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:10 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0}}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r8, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r9, 0x400454c8, 0x1) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r10, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r10}, &(0x7f0000000f80), &(0x7f0000000fc0)=r10}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1389.800225][T21387] Bluetooth: hci8: command 0x041b tx timeout 03:57:11 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0}}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r8, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r9, 0x400454c8, 0x1) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r10, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r10}, &(0x7f0000000f80), &(0x7f0000000fc0)=r10}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:11 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0}}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r8, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r9, 0x400454c8, 0x1) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r10, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r10}, &(0x7f0000000f80), &(0x7f0000000fc0)=r10}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:12 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:13 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1391.880298][T21387] Bluetooth: hci8: command 0x040f tx timeout [ 1392.912070][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1392.960514][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1393.253523][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:57:14 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1393.960426][T21387] Bluetooth: hci8: command 0x0419 tx timeout [ 1394.192830][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:57:15 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:16 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:17 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:17 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x0, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:18 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x0, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:18 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x0, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1397.600772][ T3584] bond0 (unregistering): Released all slaves 03:57:19 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x0, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:20 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x0, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:21 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x0, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:22 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:23 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1403.002667][ T3584] team0 (unregistering): Port device team_slave_1 removed 03:57:24 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1403.402395][ T3584] team0 (unregistering): Port device team_slave_0 removed 03:57:25 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x0, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1404.880608][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1404.941813][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1405.233915][ T3584] bond0 (unregistering): Released all slaves 03:57:26 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x0, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:27 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x0, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:27 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r9, 0x400454c8, 0x1) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r10, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r10}, &(0x7f0000000f80), &(0x7f0000000fc0)=r10}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:28 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r9, 0x400454c8, 0x1) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r10, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r10}, &(0x7f0000000f80), &(0x7f0000000fc0)=r10}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:29 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r9, 0x400454c8, 0x1) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r10, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r10}, &(0x7f0000000f80), &(0x7f0000000fc0)=r10}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:30 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1409.480316][T10767] Bluetooth: hci2: command 0x0406 tx timeout 03:57:30 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1409.981650][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1410.292143][ T3584] team0 (unregistering): Port device team_slave_0 removed 03:57:31 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1410.677348][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:57:31 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:32 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1411.733717][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:57:33 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:33 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x0, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:34 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x0, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1414.421184][ T3584] bond0 (unregistering): Released all slaves 03:57:35 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x0, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:37 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x0, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:37 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x0, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:38 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x0, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:39 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1418.120335][ T7205] Bluetooth: hci9: command 0x0409 tx timeout 03:57:39 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:40 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:41 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1420.038553][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1420.061795][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1420.200709][T23937] Bluetooth: hci9: command 0x041b tx timeout [ 1420.670543][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:57:42 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1421.212929][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1422.280643][T22717] Bluetooth: hci9: command 0x040f tx timeout 03:57:43 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1422.771320][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1422.780232][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 03:57:44 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x0, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:45 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x0, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1424.370524][ T7205] Bluetooth: hci9: command 0x0419 tx timeout [ 1424.523842][ T3584] bond0 (unregistering): Released all slaves 03:57:45 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x0, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1424.840124][T19510] Bluetooth: hci3: command 0x0406 tx timeout [ 1424.846226][T19510] Bluetooth: hci4: command 0x0406 tx timeout 03:57:46 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x0, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:47 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x0, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1425.971927][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1426.531253][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1426.617534][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:57:47 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x0, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:48 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x0, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1428.020732][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:57:50 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x0, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:50 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x0, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1430.071512][ T3584] bond0 (unregistering): Released all slaves 03:57:51 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1430.610621][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1431.322437][ T3584] team0 (unregistering): Port device team_slave_0 removed 03:57:52 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1431.540614][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:57:53 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1432.430757][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:57:53 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:54 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:55 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1434.440249][T21387] Bluetooth: hci10: command 0x0409 tx timeout [ 1434.530475][ T7205] Bluetooth: hci11: command 0x0409 tx timeout [ 1434.772637][ T3584] bond0 (unregistering): Released all slaves 03:57:56 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x0, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1435.133378][ T3584] team0 (unregistering): Port device team_slave_1 removed 03:57:56 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x0, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1435.691476][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1436.197649][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1436.403332][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1436.520312][T21387] Bluetooth: hci10: command 0x041b tx timeout [ 1436.600401][T21387] Bluetooth: hci11: command 0x041b tx timeout 03:57:58 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x0, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:57:59 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x0, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1438.600433][T19510] Bluetooth: hci10: command 0x040f tx timeout [ 1438.680217][T19510] Bluetooth: hci11: command 0x040f tx timeout 03:57:59 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x0, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1439.620875][ T3584] bond0 (unregistering): Released all slaves 03:58:01 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x0, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1440.680307][T19510] Bluetooth: hci10: command 0x0419 tx timeout [ 1440.760238][T19510] Bluetooth: hci11: command 0x0419 tx timeout 03:58:02 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x0, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:03 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x0, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:03 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x0, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:04 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:05 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:05 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1444.997033][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1445.188346][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1445.214203][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1445.242513][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1445.320458][T21387] Bluetooth: hci1: command 0x0406 tx timeout 03:58:06 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:07 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1446.380837][ T3584] bond0 (unregistering): Released all slaves 03:58:07 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:08 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x0, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:09 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x0, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:09 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x0, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:10 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x0, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:11 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x0, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1450.265314][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1450.297103][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1450.852524][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1451.300504][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:58:12 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x0, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:12 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0x0, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:14 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0x0, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1453.880151][T22717] Bluetooth: hci12: command 0x0409 tx timeout 03:58:15 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0x0, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:15 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1455.078531][ T3584] bond0 (unregistering): Released all slaves 03:58:16 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1455.960120][T10767] Bluetooth: hci12: command 0x041b tx timeout 03:58:17 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:17 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:19 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1458.040247][T19510] Bluetooth: hci12: command 0x040f tx timeout [ 1459.131992][ T3584] team0 (unregistering): Port device team_slave_1 removed 03:58:20 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1459.360391][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1459.892805][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:58:21 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x0, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1460.120200][T21387] Bluetooth: hci12: command 0x0419 tx timeout [ 1460.353726][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:58:21 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x0, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:22 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x0, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:22 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x0, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1462.220884][ T3584] bond0 (unregistering): Released all slaves 03:58:23 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x0, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:24 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x0, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:24 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0x0, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:25 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0x0, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:26 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0x0, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:27 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1466.131119][ T3584] team0 (unregistering): Port device team_slave_1 removed 03:58:27 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1466.771394][ T3584] team0 (unregistering): Port device team_slave_0 removed 03:58:28 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1467.040429][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:58:28 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1467.761528][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:58:29 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:29 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:30 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x0, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:31 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x0, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1470.210833][ T3584] bond0 (unregistering): Released all slaves [ 1470.976913][ T3584] team0 (unregistering): Port device team_slave_1 removed 03:58:32 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x0, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1471.414427][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1471.633921][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:58:32 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1472.134241][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:58:33 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:34 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:36 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:37 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1476.040370][T19510] Bluetooth: hci5: command 0x0406 tx timeout 03:58:37 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1476.856916][ T3584] bond0 (unregistering): Released all slaves 03:58:38 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:39 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:39 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:40 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x0, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:41 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x0, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:42 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x0, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:43 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0x0, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1482.802950][ T3584] team0 (unregistering): Port device team_slave_1 removed 03:58:44 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0x0, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1483.108516][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1483.580262][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 03:58:45 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0x0, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1484.200398][T19510] Bluetooth: hci13: command 0x0409 tx timeout [ 1484.211305][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.217589][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1484.340505][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 03:58:45 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:46 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1486.280209][T22717] Bluetooth: hci13: command 0x041b tx timeout 03:58:47 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1486.632028][ T3584] bond0 (unregistering): Released all slaves 03:58:48 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1488.370384][T23937] Bluetooth: hci13: command 0x040f tx timeout 03:58:49 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:50 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x7, 0x0, &(0x7f0000000b00)=[{0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:50 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x0, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:51 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x0, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:51 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x0, 0x2, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1490.450585][T23937] Bluetooth: hci13: command 0x0419 tx timeout 03:58:52 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x0, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1491.400185][T19510] Bluetooth: hci7: command 0x0406 tx timeout [ 1491.410133][T23937] Bluetooth: hci6: command 0x0406 tx timeout 03:58:52 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x0, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:53 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x0, 0x3, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) 03:58:54 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x0, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1493.170352][ T26] INFO: task kworker/1:2:1066 blocked for more than 143 seconds. [ 1493.178370][ T26] Not tainted 5.15.148-syzkaller #0 [ 1493.189966][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1493.198667][ T26] task:kworker/1:2 state:D stack:24736 pid: 1066 ppid: 2 flags:0x00004000 [ 1493.209964][ T26] Workqueue: events switchdev_deferred_process_work [ 1493.216776][ T26] Call Trace: [ 1493.229964][ T26] [ 1493.232981][ T26] __schedule+0x12c4/0x45b0 [ 1493.237630][ T26] ? mark_lock+0x98/0x340 [ 1493.242509][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1493.248539][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1493.259963][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1493.279979][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1493.285243][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1493.299963][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1493.305242][ T26] schedule+0x11b/0x1f0 [ 1493.309402][ T26] schedule_preempt_disabled+0xf/0x20 [ 1493.340888][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1493.346121][ T26] ? switchdev_deferred_process_work+0xa/0x20 [ 1493.363444][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1493.379964][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1493.385972][ T26] ? print_irqtrace_events+0x210/0x210 [ 1493.410256][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1493.416335][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1493.422073][ T26] mutex_lock_nested+0x17/0x20 [ 1493.426854][ T26] switchdev_deferred_process_work+0xa/0x20 [ 1493.450105][ T26] process_one_work+0x8a1/0x10c0 [ 1493.455124][ T26] ? worker_detach_from_pool+0x260/0x260 [ 1493.460854][ T26] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1493.466403][ T26] ? kthread_data+0x4e/0xc0 [ 1493.483451][ T26] ? wq_worker_running+0x97/0x170 [ 1493.488504][ T26] worker_thread+0xaca/0x1280 [ 1493.498894][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1493.509400][ T26] kthread+0x3f6/0x4f0 [ 1493.516425][ T26] ? rcu_lock_release+0x20/0x20 [ 1493.521384][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1493.525977][ T26] ret_from_fork+0x1f/0x30 [ 1493.539522][ T26] [ 1493.546454][ T3584] team0 (unregistering): Port device team_slave_1 removed [ 1493.555466][ T26] INFO: task kworker/1:8:3566 blocked for more than 143 seconds. [ 1493.570278][ T26] Not tainted 5.15.148-syzkaller #0 [ 1493.580028][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1493.594342][ T26] task:kworker/1:8 state:D stack:23736 pid: 3566 ppid: 2 flags:0x00004000 [ 1493.607342][ T26] Workqueue: events linkwatch_event [ 1493.617204][ T26] Call Trace: [ 1493.624287][ T26] [ 1493.627230][ T26] __schedule+0x12c4/0x45b0 [ 1493.636347][ T26] ? mark_lock+0x98/0x340 [ 1493.643459][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1493.649456][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1493.662874][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1493.668351][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1493.680066][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1493.685281][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1493.696594][ T26] schedule+0x11b/0x1f0 03:58:54 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x0, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1493.703333][ T26] schedule_preempt_disabled+0xf/0x20 [ 1493.708721][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1493.719214][ T26] ? linkwatch_event+0xa/0x50 [ 1493.730767][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1493.735975][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1493.750016][ T26] ? print_irqtrace_events+0x210/0x210 [ 1493.755491][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1493.768158][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1493.774341][ T26] mutex_lock_nested+0x17/0x20 [ 1493.779448][ T26] linkwatch_event+0xa/0x50 [ 1493.790064][ T26] process_one_work+0x8a1/0x10c0 [ 1493.795030][ T26] ? worker_detach_from_pool+0x260/0x260 [ 1493.810079][ T26] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1493.815649][ T26] ? kthread_data+0x4e/0xc0 [ 1493.830021][ T26] ? wq_worker_running+0x97/0x170 [ 1493.835073][ T26] worker_thread+0xaca/0x1280 [ 1493.839781][ T26] kthread+0x3f6/0x4f0 [ 1493.860016][ T26] ? rcu_lock_release+0x20/0x20 [ 1493.864887][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1493.869480][ T26] ret_from_fork+0x1f/0x30 [ 1493.874510][ T26] [ 1493.884623][ T26] INFO: task kworker/1:9:3596 blocked for more than 144 seconds. [ 1493.900005][ T26] Not tainted 5.15.148-syzkaller #0 [ 1493.905727][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1493.930037][ T26] task:kworker/1:9 state:D stack:22776 pid: 3596 ppid: 2 flags:0x00004000 [ 1493.939257][ T26] Workqueue: events_power_efficient reg_check_chans_work [ 1493.946700][ T26] Call Trace: [ 1493.960085][ T26] [ 1493.963029][ T26] __schedule+0x12c4/0x45b0 [ 1493.967558][ T26] ? mark_lock+0x98/0x340 [ 1493.972344][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1493.978337][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1493.990648][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1493.996123][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1494.010112][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1494.015349][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1494.030080][ T26] schedule+0x11b/0x1f0 [ 1494.034256][ T26] schedule_preempt_disabled+0xf/0x20 [ 1494.039633][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1494.045421][ T26] ? reg_check_chans_work+0x7f/0xb70 [ 1494.055797][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1494.070096][ T26] mutex_lock_nested+0x17/0x20 [ 1494.074870][ T26] reg_check_chans_work+0x7f/0xb70 [ 1494.080326][ T26] ? read_lock_is_recursive+0x10/0x10 [ 1494.086021][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1494.100625][ T26] ? reg_process_ht_flags+0xba0/0xba0 [ 1494.106009][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1494.120376][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1494.125598][ T26] process_one_work+0x8a1/0x10c0 [ 1494.130966][ T26] ? worker_detach_from_pool+0x260/0x260 [ 1494.136607][ T26] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1494.150010][ T26] ? kthread_data+0x4e/0xc0 [ 1494.154528][ T26] ? wq_worker_running+0x97/0x170 [ 1494.159555][ T26] worker_thread+0xaca/0x1280 [ 1494.180008][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1494.186277][ T26] kthread+0x3f6/0x4f0 [ 1494.190760][ T26] ? rcu_lock_release+0x20/0x20 [ 1494.195616][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1494.211037][ T26] ret_from_fork+0x1f/0x30 [ 1494.215481][ T26] [ 1494.218511][ T26] INFO: task kworker/1:14:15807 blocked for more than 144 seconds. [ 1494.240033][ T26] Not tainted 5.15.148-syzkaller #0 [ 1494.245765][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1494.254758][ T26] task:kworker/1:14 state:D stack:24824 pid:15807 ppid: 2 flags:0x00004000 [ 1494.268331][ T26] Workqueue: ipv6_addrconf addrconf_dad_work [ 1494.280770][ T26] Call Trace: [ 1494.284055][ T26] [ 1494.287295][ T26] __schedule+0x12c4/0x45b0 [ 1494.295380][ T26] ? mark_lock+0x98/0x340 [ 1494.299727][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1494.323425][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1494.329334][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1494.336864][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1494.342371][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1494.347573][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1494.367786][ T26] schedule+0x11b/0x1f0 [ 1494.372196][ T26] schedule_preempt_disabled+0xf/0x20 [ 1494.377570][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1494.391093][ T26] ? addrconf_dad_work+0xcc/0x1720 [ 1494.396223][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1494.401838][ T26] mutex_lock_nested+0x17/0x20 [ 1494.406616][ T26] addrconf_dad_work+0xcc/0x1720 [ 1494.420026][ T26] ? read_lock_is_recursive+0x10/0x10 [ 1494.425476][ T26] ? rcu_lock_release+0x20/0x20 [ 1494.431394][ T26] ? print_irqtrace_events+0x210/0x210 [ 1494.436859][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1494.447032][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1494.452542][ T26] process_one_work+0x8a1/0x10c0 [ 1494.457511][ T26] ? worker_detach_from_pool+0x260/0x260 [ 1494.470076][ T26] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1494.475635][ T26] ? kthread_data+0x4e/0xc0 [ 1494.490093][ T26] ? wq_worker_running+0x97/0x170 [ 1494.496380][ T26] worker_thread+0xaca/0x1280 [ 1494.502164][ T26] kthread+0x3f6/0x4f0 [ 1494.506245][ T26] ? rcu_lock_release+0x20/0x20 [ 1494.511447][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1494.516045][ T26] ret_from_fork+0x1f/0x30 [ 1494.526140][ T26] [ 1494.529175][ T26] INFO: task kworker/1:17:15810 blocked for more than 144 seconds. [ 1494.540675][ T26] Not tainted 5.15.148-syzkaller #0 [ 1494.546401][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1494.569979][ T26] task:kworker/1:17 state:D stack:24800 pid:15810 ppid: 2 flags:0x00004000 [ 1494.579206][ T26] Workqueue: events nsim_dev_trap_report_work [ 1494.585840][ T26] Call Trace: [ 1494.589123][ T26] [ 1494.595060][ T26] __schedule+0x12c4/0x45b0 [ 1494.599615][ T26] ? mark_lock+0x98/0x340 [ 1494.610627][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1494.616626][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1494.629990][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1494.635469][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1494.642624][ T3584] team0 (unregistering): Port device team_slave_0 removed [ 1494.660069][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1494.665285][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1494.671636][ T26] schedule+0x11b/0x1f0 [ 1494.675804][ T26] schedule_preempt_disabled+0xf/0x20 [ 1494.690045][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1494.695349][ T26] ? nsim_dev_trap_report_work+0x56/0xab0 [ 1494.702217][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1494.707448][ T26] mutex_lock_nested+0x17/0x20 [ 1494.720652][ T26] nsim_dev_trap_report_work+0x56/0xab0 [ 1494.726221][ T26] ? print_irqtrace_events+0x210/0x210 [ 1494.732065][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1494.737966][ T26] ? do_raw_spin_unlock+0x137/0x8b0 03:58:55 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x0, 0x4}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1494.750043][ T26] process_one_work+0x8a1/0x10c0 [ 1494.755044][ T26] ? worker_detach_from_pool+0x260/0x260 [ 1494.761963][ T26] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1494.767520][ T26] ? kthread_data+0x4e/0xc0 [ 1494.772393][ T26] ? wq_worker_running+0x97/0x170 [ 1494.777429][ T26] worker_thread+0xaca/0x1280 [ 1494.790060][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1494.796066][ T26] kthread+0x3f6/0x4f0 [ 1494.802159][ T26] ? rcu_lock_release+0x20/0x20 [ 1494.807026][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1494.820078][ T26] ret_from_fork+0x1f/0x30 [ 1494.824526][ T26] [ 1494.827577][ T26] INFO: task syz-executor.1:22742 blocked for more than 145 seconds. [ 1494.836698][ T26] Not tainted 5.15.148-syzkaller #0 [ 1494.842906][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1494.860036][ T26] task:syz-executor.1 state:D stack:21016 pid:22742 ppid: 1 flags:0x00004006 [ 1494.869252][ T26] Call Trace: [ 1494.873511][ T26] [ 1494.876452][ T26] __schedule+0x12c4/0x45b0 [ 1494.890011][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1494.895915][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1494.902069][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1494.907291][ T26] schedule+0x11b/0x1f0 [ 1494.920275][ T26] schedule_preempt_disabled+0xf/0x20 [ 1494.925668][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1494.931205][ T26] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1494.936329][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1494.950000][ T26] mutex_lock_nested+0x17/0x20 [ 1494.954781][ T26] rtnetlink_rcv_msg+0x94c/0xee0 [ 1494.959730][ T26] ? rtnetlink_bind+0x80/0x80 [ 1494.970026][ T26] ? __local_bh_enable_ip+0x164/0x1f0 [ 1494.975464][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1494.991374][ T26] ? __local_bh_enable_ip+0x164/0x1f0 [ 1494.996766][ T26] ? local_bh_enable+0x5/0x20 [ 1495.001993][ T26] ? _local_bh_enable+0xa0/0xa0 [ 1495.007193][ T26] ? __dev_queue_xmit+0x1c56/0x3230 [ 1495.020044][ T26] ? __copy_skb_header+0x47b/0x600 [ 1495.025187][ T26] ? dev_queue_xmit+0x20/0x20 [ 1495.029863][ T26] ? memcpy+0x3c/0x60 [ 1495.034366][ T26] ? __copy_skb_header+0x47b/0x600 [ 1495.039486][ T26] netlink_rcv_skb+0x1cf/0x410 [ 1495.060037][ T26] ? rtnetlink_bind+0x80/0x80 [ 1495.064732][ T26] ? netlink_ack+0xb10/0xb10 [ 1495.069345][ T26] netlink_unicast+0x7b6/0x980 [ 1495.074563][ T26] ? netlink_detachskb+0x90/0x90 [ 1495.079510][ T26] ? 0xffffffff81000000 [ 1495.089450][ T26] ? __check_object_size+0x300/0x410 [ 1495.095963][ T26] ? bpf_lsm_netlink_send+0x5/0x10 [ 1495.109986][ T26] netlink_sendmsg+0xa30/0xd60 [ 1495.114779][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1495.120385][ T26] ? aa_sock_msg_perm+0x91/0x150 [ 1495.125403][ T26] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1495.140018][ T26] ? security_socket_sendmsg+0x7d/0xa0 [ 1495.145529][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1495.160842][ T26] __sys_sendto+0x564/0x720 [ 1495.165407][ T26] ? __ia32_sys_getpeername+0x80/0x80 [ 1495.180073][ T26] ? print_irqtrace_events+0x210/0x210 [ 1495.185548][ T26] ? vtime_user_exit+0x2d1/0x400 [ 1495.200648][ T26] __x64_sys_sendto+0xda/0xf0 [ 1495.205342][ T26] do_syscall_64+0x3d/0xb0 [ 1495.210725][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1495.216634][ T26] RIP: 0033:0x7f2e63a89a9c [ 1495.232988][ T26] RSP: 002b:00007ffcb4ce3f30 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1495.243626][ T26] RAX: ffffffffffffffda RBX: 00007f2e646df620 RCX: 00007f2e63a89a9c [ 1495.257892][ T26] RDX: 0000000000000040 RSI: 00007f2e646df670 RDI: 0000000000000003 [ 1495.270627][ T26] RBP: 0000000000000000 R08: 00007ffcb4ce3f84 R09: 000000000000000c [ 1495.278609][ T26] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1495.300083][ T26] R13: 0000000000000000 R14: 00007f2e646df670 R15: 0000000000000000 [ 1495.308112][ T26] [ 1495.322383][ T26] INFO: task syz-executor.0:22937 blocked for more than 145 seconds. [ 1495.330578][ T26] Not tainted 5.15.148-syzkaller #0 [ 1495.336298][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1495.350049][ T26] task:syz-executor.0 state:D stack:21624 pid:22937 ppid: 1 flags:0x00004006 [ 1495.359329][ T26] Call Trace: [ 1495.363076][ T26] [ 1495.366019][ T26] __schedule+0x12c4/0x45b0 [ 1495.370928][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1495.376835][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1495.390034][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1495.395293][ T26] schedule+0x11b/0x1f0 [ 1495.399453][ T26] schedule_preempt_disabled+0xf/0x20 [ 1495.421841][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1495.427066][ T26] ? wg_set_device+0xff/0x2100 [ 1495.432264][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1495.437469][ T26] ? kasan_unpoison+0x42/0x60 [ 1495.450007][ T26] ? dev_get_by_name+0x24e/0x280 [ 1495.455010][ T26] mutex_lock_nested+0x17/0x20 [ 1495.459795][ T26] wg_set_device+0xff/0x2100 [ 1495.464878][ T26] ? nla_get_range_unsigned+0x1e1/0x430 [ 1495.470731][ T26] ? __nla_validate_parse+0x1e6b/0x27f0 [ 1495.476298][ T26] ? wg_get_device_done+0xf0/0xf0 [ 1495.481842][ T26] ? __nla_validate+0x50/0x50 [ 1495.486545][ T26] ? __nla_parse+0x3c/0x50 [ 1495.500045][ T26] ? genl_family_rcv_msg_attrs_parse+0x1d1/0x290 [ 1495.506459][ T26] genl_rcv_msg+0xfbd/0x14a0 [ 1495.511439][ T26] ? genl_bind+0x420/0x420 [ 1495.516633][ T26] ? arch_stack_walk+0xf3/0x140 [ 1495.521917][ T26] ? mark_lock+0x98/0x340 [ 1495.526261][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1495.540115][ T26] ? wg_get_device_done+0xf0/0xf0 [ 1495.545168][ T26] netlink_rcv_skb+0x1cf/0x410 [ 1495.550248][ T26] ? genl_bind+0x420/0x420 [ 1495.554680][ T26] ? netlink_ack+0xb10/0xb10 [ 1495.559280][ T26] ? down_read+0x1b3/0x2e0 [ 1495.567699][ T26] ? genl_rcv+0x9/0x40 [ 1495.573253][ T26] genl_rcv+0x24/0x40 [ 1495.577254][ T26] netlink_unicast+0x7b6/0x980 [ 1495.585781][ T26] ? netlink_detachskb+0x90/0x90 [ 1495.593264][ T26] ? 0xffffffff81000000 [ 1495.597429][ T26] ? __check_object_size+0x300/0x410 [ 1495.608244][ T26] ? bpf_lsm_netlink_send+0x5/0x10 [ 1495.615247][ T26] netlink_sendmsg+0xa30/0xd60 [ 1495.621975][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1495.627274][ T26] ? aa_sock_msg_perm+0x91/0x150 [ 1495.632686][ T26] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1495.638005][ T26] ? security_socket_sendmsg+0x7d/0xa0 [ 1495.644538][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1495.649778][ T26] __sys_sendto+0x564/0x720 [ 1495.654726][ T26] ? __ia32_sys_getpeername+0x80/0x80 [ 1495.664938][ T26] ? rcu_is_watching+0x11/0xa0 [ 1495.669779][ T26] ? print_irqtrace_events+0x210/0x210 [ 1495.680010][ T26] ? vtime_user_exit+0x2d1/0x400 [ 1495.685010][ T26] __x64_sys_sendto+0xda/0xf0 [ 1495.689691][ T26] do_syscall_64+0x3d/0xb0 [ 1495.699985][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1495.705947][ T26] RIP: 0033:0x7f9381350a9c [ 1495.720139][ T26] RSP: 002b:00007fff021edc40 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1495.729456][ T26] RAX: ffffffffffffffda RBX: 00007f9381fa6620 RCX: 00007f9381350a9c [ 1495.737947][ T26] RDX: 0000000000000170 RSI: 00007f9381fa6670 RDI: 0000000000000005 [ 1495.750640][ T26] RBP: 0000000000000000 R08: 00007fff021edc94 R09: 000000000000000c [ 1495.758624][ T26] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 1495.780015][ T26] R13: 0000000000000000 R14: 00007f9381fa6670 R15: 0000000000000000 [ 1495.788010][ T26] [ 1495.799700][ T26] INFO: task syz-executor.4:22938 blocked for more than 145 seconds. [ 1495.808284][ T26] Not tainted 5.15.148-syzkaller #0 [ 1495.824091][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1495.840122][ T26] task:syz-executor.4 state:D stack:21624 pid:22938 ppid: 1 flags:0x00004006 [ 1495.849347][ T26] Call Trace: [ 1495.852997][ T26] [ 1495.855931][ T26] __schedule+0x12c4/0x45b0 [ 1495.870203][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1495.876121][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1495.882069][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1495.887280][ T26] schedule+0x11b/0x1f0 [ 1495.891838][ T26] schedule_preempt_disabled+0xf/0x20 [ 1495.897222][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1495.908496][ T26] ? netdev_run_todo+0xa4f/0xc40 [ 1495.917454][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1495.926311][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1495.937271][ T26] ? _raw_spin_unlock+0x40/0x40 [ 1495.950038][ T26] mutex_lock_nested+0x17/0x20 [ 1495.954857][ T26] netdev_run_todo+0xa4f/0xc40 [ 1495.959639][ T26] ? netdev_refcnt_read+0x50/0x50 [ 1495.965457][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1495.980156][ T26] ? bpf_offload_dev_netdev_register+0xc40/0xc40 [ 1495.986607][ T26] ? _raw_spin_unlock+0x24/0x40 [ 1495.991916][ T26] ? simple_release_fs+0x98/0xd0 [ 1495.996921][ T26] nsim_destroy+0xac/0x140 [ 1496.001740][ T26] __nsim_dev_port_del+0x153/0x1b0 [ 1496.006871][ T26] nsim_dev_reload_destroy+0x15e/0x240 [ 1496.020166][ T26] nsim_dev_remove+0x59/0x100 [ 1496.024860][ T26] ? nsim_bus_probe+0x20/0x20 [ 1496.031187][ T26] device_release_driver_internal+0x4cb/0x7f0 [ 1496.037374][ T26] bus_remove_device+0x2e5/0x400 [ 1496.050057][ T26] device_del+0x6e2/0xbd0 [ 1496.054489][ T26] ? del_device_store+0xf1/0x470 [ 1496.059439][ T26] ? kill_device+0x160/0x160 [ 1496.070095][ T26] device_unregister+0x1c/0xc0 [ 1496.074915][ T26] del_device_store+0x321/0x470 [ 1496.079777][ T26] ? del_port_store+0x270/0x270 [ 1496.085752][ T26] ? sysfs_kf_write+0x181/0x2a0 [ 1496.100113][ T26] ? sysfs_kf_read+0x300/0x300 [ 1496.104888][ T26] kernfs_fop_write_iter+0x3a2/0x4f0 [ 1496.110616][ T26] vfs_write+0xacf/0xe50 [ 1496.114879][ T26] ? file_end_write+0x250/0x250 [ 1496.119745][ T26] ? read_lock_is_recursive+0x10/0x10 [ 1496.131358][ T26] ? __fdget_pos+0x2d2/0x380 [ 1496.136017][ T26] ksys_write+0x1a2/0x2c0 [ 1496.150635][ T26] ? print_irqtrace_events+0x210/0x210 [ 1496.156120][ T26] ? __ia32_sys_read+0x80/0x80 [ 1496.161248][ T26] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1496.167411][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1496.173090][ T26] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1496.179085][ T26] do_syscall_64+0x3d/0xb0 [ 1496.190733][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1496.196645][ T26] RIP: 0033:0x7f800dfe7aef [ 1496.210640][ T26] RSP: 002b:00007ffe3fb76db0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1496.219074][ T26] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f800dfe7aef [ 1496.227429][ T26] RDX: 0000000000000001 RSI: 00007ffe3fb76e00 RDI: 0000000000000005 [ 1496.250078][ T26] RBP: 00007f800e035021 R08: 0000000000000000 R09: 00007ffe3fb76c07 [ 1496.258060][ T26] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1496.267096][ T26] R13: 00007ffe3fb76e00 R14: 00007f800ec40620 R15: 0000000000000003 [ 1496.275401][ T26] [ 1496.278837][ T3584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1496.290033][ T26] INFO: task syz-executor.3:23096 blocked for more than 146 seconds. [ 1496.298119][ T26] Not tainted 5.15.148-syzkaller #0 [ 1496.309765][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1496.318725][ T26] task:syz-executor.3 state:D stack:21624 pid:23096 ppid: 1 flags:0x00004006 [ 1496.336045][ T26] Call Trace: [ 1496.339334][ T26] [ 1496.342680][ T26] __schedule+0x12c4/0x45b0 [ 1496.347228][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1496.360136][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1496.365739][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1496.372046][ T26] schedule+0x11b/0x1f0 [ 1496.376220][ T26] schedule_preempt_disabled+0xf/0x20 [ 1496.390114][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1496.395340][ T26] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1496.400836][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1496.406058][ T26] mutex_lock_nested+0x17/0x20 [ 1496.411946][ T26] rtnetlink_rcv_msg+0x94c/0xee0 [ 1496.416900][ T26] ? reacquire_held_locks+0x660/0x660 [ 1496.422673][ T26] ? rtnetlink_bind+0x80/0x80 [ 1496.427361][ T26] ? is_bpf_text_address+0x24f/0x260 [ 1496.438311][ T26] ? stack_trace_save+0x1c0/0x1c0 [ 1496.451757][ T26] ? __kernel_text_address+0x94/0x100 [ 1496.457148][ T26] ? unwind_get_return_address+0x49/0x80 [ 1496.463179][ T26] ? arch_stack_walk+0xf3/0x140 [ 1496.468066][ T26] ? mark_lock+0x98/0x340 [ 1496.481065][ T26] ? mark_lock+0x98/0x340 [ 1496.485415][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1496.490918][ T26] netlink_rcv_skb+0x1cf/0x410 [ 1496.495695][ T26] ? rtnetlink_bind+0x80/0x80 [ 1496.506329][ T26] ? netlink_ack+0xb10/0xb10 [ 1496.511366][ T26] netlink_unicast+0x7b6/0x980 [ 1496.516153][ T26] ? netlink_detachskb+0x90/0x90 [ 1496.530155][ T26] ? 0xffffffff81000000 [ 1496.534347][ T26] ? __check_object_size+0x300/0x410 [ 1496.541181][ T26] ? bpf_lsm_netlink_send+0x5/0x10 [ 1496.546308][ T26] netlink_sendmsg+0xa30/0xd60 [ 1496.551579][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1496.556797][ T26] ? aa_sock_msg_perm+0x91/0x150 [ 1496.570298][ T26] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1496.575597][ T26] ? security_socket_sendmsg+0x7d/0xa0 [ 1496.581440][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1496.586649][ T26] __sys_sendto+0x564/0x720 03:58:57 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1496.592342][ T26] ? __ia32_sys_getpeername+0x80/0x80 [ 1496.597750][ T26] ? print_irqtrace_events+0x210/0x210 [ 1496.607234][ T26] ? vtime_user_exit+0x2d1/0x400 [ 1496.620095][ T26] __x64_sys_sendto+0xda/0xf0 [ 1496.624828][ T26] do_syscall_64+0x3d/0xb0 [ 1496.629252][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1496.636328][ T26] RIP: 0033:0x7fea9947ba9c [ 1496.648910][ T26] RSP: 002b:00007fffc159e8f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1496.657712][ T26] RAX: ffffffffffffffda RBX: 00007fea9a0d1620 RCX: 00007fea9947ba9c [ 1496.670260][ T26] RDX: 0000000000000028 RSI: 00007fea9a0d1670 RDI: 0000000000000003 [ 1496.678244][ T26] RBP: 0000000000000000 R08: 00007fffc159e944 R09: 000000000000000c [ 1496.695670][ T26] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1496.710125][ T26] R13: 0000000000000000 R14: 00007fea9a0d1670 R15: 0000000000000000 [ 1496.718125][ T26] [ 1496.730089][ T26] INFO: task syz-executor.1:23869 blocked for more than 146 seconds. [ 1496.738156][ T26] Not tainted 5.15.148-syzkaller #0 [ 1496.750035][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1496.758702][ T26] task:syz-executor.1 state:D stack:26624 pid:23869 ppid: 1 flags:0x00004006 [ 1496.779426][ T26] Call Trace: [ 1496.783113][ T26] [ 1496.786053][ T26] __schedule+0x12c4/0x45b0 [ 1496.800236][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1496.806189][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1496.812665][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1496.817874][ T26] schedule+0x11b/0x1f0 [ 1496.824649][ T26] schedule_preempt_disabled+0xf/0x20 [ 1496.840513][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1496.845739][ T26] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1496.855549][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1496.870100][ T26] mutex_lock_nested+0x17/0x20 [ 1496.874924][ T26] rtnetlink_rcv_msg+0x94c/0xee0 [ 1496.879885][ T26] ? reacquire_held_locks+0x660/0x660 [ 1496.885768][ T26] ? rtnetlink_bind+0x80/0x80 [ 1496.890741][ T26] ? is_bpf_text_address+0x24f/0x260 [ 1496.896033][ T26] ? stack_trace_save+0x1c0/0x1c0 [ 1496.910067][ T26] ? __kernel_text_address+0x94/0x100 [ 1496.915495][ T26] ? unwind_get_return_address+0x49/0x80 [ 1496.922614][ T26] ? arch_stack_walk+0xf3/0x140 [ 1496.927484][ T26] ? mark_lock+0x98/0x340 [ 1496.940056][ T26] ? mark_lock+0x98/0x340 [ 1496.944447][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1496.950756][ T26] netlink_rcv_skb+0x1cf/0x410 [ 1496.955535][ T26] ? rtnetlink_bind+0x80/0x80 [ 1496.961193][ T26] ? netlink_ack+0xb10/0xb10 [ 1496.965805][ T26] netlink_unicast+0x7b6/0x980 [ 1496.980083][ T26] ? netlink_detachskb+0x90/0x90 [ 1496.985085][ T26] ? 0xffffffff81000000 [ 1496.989240][ T26] ? __check_object_size+0x300/0x410 [ 1496.994964][ T26] ? bpf_lsm_netlink_send+0x5/0x10 [ 1497.000649][ T26] netlink_sendmsg+0xa30/0xd60 [ 1497.005518][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1497.020041][ T26] ? aa_sock_msg_perm+0x91/0x150 [ 1497.025020][ T26] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1497.031319][ T26] ? security_socket_sendmsg+0x7d/0xa0 [ 1497.036784][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1497.045916][ T26] __sys_sendto+0x564/0x720 [ 1497.060328][ T26] ? __ia32_sys_getpeername+0x80/0x80 [ 1497.065884][ T26] ? print_irqtrace_events+0x210/0x210 [ 1497.072300][ T26] ? vtime_user_exit+0x2d1/0x400 [ 1497.077259][ T26] __x64_sys_sendto+0xda/0xf0 [ 1497.088338][ T26] do_syscall_64+0x3d/0xb0 [ 1497.093040][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1497.098944][ T26] RIP: 0033:0x7f03b0032a9c [ 1497.110019][ T26] RSP: 002b:00007ffc49505800 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1497.118444][ T26] RAX: ffffffffffffffda RBX: 00007f03b0c88620 RCX: 00007f03b0032a9c [ 1497.130084][ T26] RDX: 0000000000000028 RSI: 00007f03b0c88670 RDI: 0000000000000003 [ 1497.146964][ T26] RBP: 0000000000000000 R08: 00007ffc49505854 R09: 000000000000000c [ 1497.158592][ T26] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1497.177094][ T26] R13: 0000000000000000 R14: 00007f03b0c88670 R15: 0000000000000000 [ 1497.190037][ T26] [ 1497.201319][ T26] [ 1497.201319][ T26] Showing all locks held in the system: [ 1497.219246][ T26] 3 locks held by kworker/u4:0/9: [ 1497.224836][ T26] 1 lock held by khungtaskd/26: [ 1497.239896][ T26] #0: ffffffff8c91f220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1497.249514][ T26] 3 locks held by kworker/1:2/1066: [ 1497.280053][ T26] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1497.310883][ T26] #1: ffffc90004e0fd20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1497.350049][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1497.370203][ T26] 2 locks held by getty/3257: [ 1497.374967][ T26] #0: ffff88814ad8e098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1497.400715][ T26] #1: ffffc9000209b2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1497.411274][ T26] 3 locks held by kworker/1:8/3566: [ 1497.416474][ T26] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1497.440044][ T26] #1: ffffc900039d7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1497.450744][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1497.459723][ T26] 5 locks held by kworker/u4:4/3584: [ 1497.487765][ T26] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1497.498308][ T26] #1: ffffc90003a17d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1497.520003][ T26] #2: ffffffff8d9ced10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1497.529337][ T26] #3: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 03:58:58 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1497.550010][ T26] #4: ffff8880b9a39718 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1497.560532][ T26] 3 locks held by kworker/1:9/3596: [ 1497.570174][ T26] #0: ffff888011c71d38 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1497.590059][ T26] #1: ffffc90003a37d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1497.600873][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1497.620625][ T26] 3 locks held by kworker/1:14/15807: [ 1497.626000][ T26] #0: ffff888023dd5d38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1497.640208][ T26] #1: ffffc9000446fd20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1497.660062][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xcc/0x1720 [ 1497.680144][ T26] 3 locks held by kworker/1:17/15810: [ 1497.685518][ T26] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1497.696607][ T26] #1: ffffc9000449fd20 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1497.710918][ T26] #2: ffff888025626400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x56/0xab0 [ 1497.730689][ T26] 2 locks held by kworker/0:3/19510: [ 1497.735977][ T26] #0: ffff888011c72538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1497.746401][ T26] #1: ffffc9000431fd20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1497.764393][ T26] 1 lock held by syz-executor.2/19828: [ 1497.771325][ T26] 1 lock held by syz-executor.1/22742: [ 1497.790074][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1497.799497][ T26] 3 locks held by syz-executor.0/22937: [ 1497.811096][ T26] #0: ffffffff8da3a190 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 [ 1497.819294][ T26] #1: ffffffff8da3a048 (genl_mutex){+.+.}-{3:3}, at: genl_rcv_msg+0x124/0x14a0 [ 1497.840613][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: wg_set_device+0xff/0x2100 [ 1497.849688][ T26] 7 locks held by syz-executor.4/22938: [ 1497.859983][ T26] #0: ffff88807f018460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1497.868971][ T26] #1: ffff888075642488 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1497.889989][ T26] #2: ffff888147791ae8 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1497.900465][ T26] #3: ffffffff8d356f08 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1497.911276][ T26] #4: ffff888073c26178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0 [ 1497.930022][ T26] #5: ffff888025626400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_reload_destroy+0x118/0x240 [ 1497.950629][ T26] #6: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40 [ 1497.959881][ T26] 1 lock held by syz-executor.3/23096: [ 1497.965832][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1497.980003][ T26] 1 lock held by syz-executor.1/23869: [ 1497.985550][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.000150][ T26] 1 lock held by syz-executor.0/24105: [ 1498.005612][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.020134][ T26] 1 lock held by syz-executor.4/24109: [ 1498.025594][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.050014][ T26] 1 lock held by syz-executor.3/24394: [ 1498.055472][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.065943][ T26] 1 lock held by syz-executor.1/24657: [ 1498.071647][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.089989][ T26] 1 lock held by syz-executor.0/24878: [ 1498.095486][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.105317][ T26] 1 lock held by syz-executor.4/24881: [ 1498.120189][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.129662][ T26] 1 lock held by syz-executor.3/25214: [ 1498.135458][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.145843][ T26] 1 lock held by syz-executor.2/25513: [ 1498.151584][ T26] #0: ffffffff8c9237e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1498.170655][ T26] 1 lock held by syz-executor.2/25517: [ 1498.176120][ T26] #0: ffffffff8c9237e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1498.200013][ T26] 4 locks held by syz-executor.2/25521: [ 1498.205561][ T26] 2 locks held by syz-executor.2/25602: [ 1498.211583][ T26] 2 locks held by syz-executor.2/25606: [ 1498.217128][ T26] 2 locks held by syz-executor.2/25659: [ 1498.230035][ T26] 2 locks held by syz-executor.2/25664: [ 1498.235657][ T26] 2 locks held by syz-executor.2/25667: [ 1498.241504][ T26] 2 locks held by syz-executor.2/25672: [ 1498.247041][ T26] 2 locks held by syz-executor.2/25675: [ 1498.253611][ T26] 2 locks held by syz-executor.2/25678: [ 1498.259162][ T26] 1 lock held by syz-executor.1/25681: [ 1498.270827][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1498.287080][ T26] 2 locks held by syz-executor.2/25690: [ 1498.299981][ T26] 2 locks held by syz-executor.2/25694: [ 1498.305618][ T26] 2 locks held by syz-executor.2/25698: [ 1498.311736][ T26] 2 locks held by syz-executor.2/25706: [ 1498.317282][ T26] 3 locks held by syz-executor.2/25711: [ 1498.330116][ T26] 2 locks held by syz-executor.2/25717: [ 1498.335699][ T26] 2 locks held by syz-executor.2/25720: [ 1498.350142][ T26] 3 locks held by syz-executor.2/25723: [ 1498.355690][ T26] 3 locks held by syz-executor.2/25728: [ 1498.364591][ T26] 2 locks held by syz-executor.2/25732: [ 1498.376952][ T26] 1 lock held by syz-executor.2/25735: [ 1498.391857][ T26] 2 locks held by syz-executor.2/25738: [ 1498.402044][ T26] 1 lock held by syz-executor.2/25741: [ 1498.415395][ T26] 3 locks held by syz-executor.2/25744: [ 1498.426769][ T26] 2 locks held by syz-executor.2/25754: [ 1498.439260][ T26] 1 lock held by syz-executor.2/25758: [ 1498.450651][ T26] 1 lock held by syz-executor.0/25759: [ 1498.460770][ T3584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1498.470822][ T26] [ 1498.473154][ T26] ============================================= [ 1498.473154][ T26] [ 1498.496798][ T26] NMI backtrace for cpu 0 [ 1498.501129][ T26] CPU: 0 PID: 26 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 1498.509096][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1498.519143][ T26] Call Trace: [ 1498.522415][ T26] [ 1498.525341][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1498.530018][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1498.535652][ T26] ? panic+0x84d/0x84d [ 1498.539726][ T26] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1498.544878][ T26] nmi_cpu_backtrace+0x46a/0x4a0 [ 1498.549820][ T26] ? __wake_up_klogd+0xd5/0x100 [ 1498.554689][ T26] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1498.560845][ T26] ? _printk+0xd1/0x111 [ 1498.564996][ T26] ? panic+0x84d/0x84d [ 1498.569058][ T26] ? __wake_up_klogd+0xcc/0x100 [ 1498.573909][ T26] ? panic+0x84d/0x84d [ 1498.577979][ T26] ? __rcu_read_unlock+0x92/0x100 [ 1498.583004][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1498.589127][ T26] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1498.595112][ T26] watchdog+0xe72/0xeb0 [ 1498.599308][ T26] kthread+0x3f6/0x4f0 [ 1498.603373][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1498.608408][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1498.613006][ T26] ret_from_fork+0x1f/0x30 [ 1498.617430][ T26] [ 1498.621194][ T26] Sending NMI from CPU 0 to CPUs 1: [ 1498.626402][ C1] NMI backtrace for cpu 1 [ 1498.626412][ C1] CPU: 1 PID: 25760 Comm: syz-executor.4 Not tainted 5.15.148-syzkaller #0 [ 1498.626428][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1498.626437][ C1] RIP: 0010:__read_once_word_nocheck+0x0/0x10 [ 1498.626458][ C1] Code: e1 07 38 c1 0f 8c dc fc ff ff 48 89 df e8 c8 54 91 00 48 ba 00 00 00 00 00 fc ff df e9 c5 fc ff ff 66 0f 1f 84 00 00 00 00 00 <48> 8b 07 c3 cc cc cc cc cc cc cc cc cc cc cc cc 31 c0 81 ff 03 00 [ 1498.626471][ C1] RSP: 0018:ffffc9000380f220 EFLAGS: 00000287 [ 1498.626486][ C1] RAX: ffffc9000380f460 RBX: ffffc9000380f458 RCX: ffffffff8df41b64 [ 1498.626497][ C1] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffc9000380f458 [ 1498.626508][ C1] RBP: ffffc90003810000 R08: 000000000000000c R09: ffffc9000380f3d0 [ 1498.626519][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff1cb8e04 [ 1498.626528][ C1] R13: 1ffffffff1cb8e04 R14: ffffc90003808000 R15: ffffc9000380f2e0 [ 1498.626539][ C1] FS: 0000555555a56480(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1498.626552][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1498.626567][ C1] CR2: 00007ffc98b06788 CR3: 000000007509b000 CR4: 00000000003506e0 [ 1498.626580][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1498.626589][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1498.626598][ C1] Call Trace: [ 1498.626602][ C1] [ 1498.626607][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1498.626625][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1498.626640][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1498.626657][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 1498.626702][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1498.626717][ C1] ? nmi_handle+0xf7/0x370 [ 1498.626732][ C1] ? __unwind_start+0x720/0x720 [ 1498.626747][ C1] ? default_do_nmi+0x62/0x150 [ 1498.626764][ C1] ? exc_nmi+0xab/0x120 [ 1498.626780][ C1] ? end_repeat_nmi+0x16/0x31 [ 1498.626801][ C1] ? __unwind_start+0x720/0x720 [ 1498.626816][ C1] ? __unwind_start+0x720/0x720 [ 1498.626831][ C1] ? __unwind_start+0x720/0x720 [ 1498.626846][ C1] [ 1498.626851][ C1] [ 1498.626855][ C1] unwind_next_frame+0xb35/0x1fa0 [ 1498.626873][ C1] ? stack_trace_save+0x113/0x1c0 [ 1498.626890][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 1498.626904][ C1] arch_stack_walk+0x10d/0x140 [ 1498.626922][ C1] ? stack_trace_save+0x113/0x1c0 [ 1498.626938][ C1] stack_trace_save+0x113/0x1c0 [ 1498.626953][ C1] ? stack_trace_snprint+0xe0/0xe0 [ 1498.626966][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1498.626986][ C1] ? print_irqtrace_events+0x210/0x210 [ 1498.627006][ C1] save_stack+0xf6/0x1e0 [ 1498.627022][ C1] ? seqcount_lockdep_reader_access+0x137/0x1e0 [ 1498.627044][ C1] ? bad_range+0x77/0x2c0 [ 1498.627057][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1498.627071][ C1] ? __reset_page_owner+0x180/0x180 [ 1498.627094][ C1] ? print_irqtrace_events+0x210/0x210 [ 1498.627110][ C1] ? preempt_count_add+0x8f/0x180 [ 1498.627127][ C1] __set_page_owner+0x37/0x300 [ 1498.627143][ C1] ? post_alloc_hook+0x104/0x220 [ 1498.627185][ C1] get_page_from_freelist+0x322a/0x33c0 [ 1498.627216][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1498.627234][ C1] ? __alloc_pages+0x700/0x700 [ 1498.627248][ C1] ? __next_zones_zonelist+0xa4/0x130 03:59:00 executing program 2: close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/176, 0xb0, 0x0, &(0x7f00000000c0)=""/55, 0x37}}, 0x10) r1 = syz_clone(0x100021400, &(0x7f0000000240), 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="29b8") r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x80, 0xfb, 0x5, 0x81, 0x0, 0x7, 0x4, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x1000, 0x1, 0x0, 0x4, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xf9d0, 0x0, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x40, 0x5, 0xe5, 0x0, 0x40, 0x0, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8, 0x40, 0x1000, 0x6, 0x7fffffff, 0x6, 0xc14a, 0x0, 0x5, 0x0, 0x1f}, r1, 0x3, r2, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r3, 0x0, 0x5, &(0x7f0000000400)='@/)%\x00'}, 0x30) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r3}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000540), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000580)={'bond0', 0x32, 0x37}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x24, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x8, 0xc, 0xe01, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000940)='GPL\x00', 0x706d, 0x0, 0x0, 0x41000, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x5, 0x4, 0x3, 0xb}, {0x3, 0x3, 0x7, 0xb}, {0x0, 0x4, 0xf, 0x8}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_tracing={0x1a, 0x4, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0xa8, &(0x7f0000000640)=""/168, 0x41000, 0x1, '\x00', r8, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x0, 0x4, 0x6, 0x6d0}, 0x10, 0x1322d, r9, 0x8, 0x0, &(0x7f0000000b00)=[{0x2, 0x2, 0x3}, {0x0, 0x1, 0xa, 0x1}, {0x0, 0x3, 0x5, 0xa}, {0x5, 0x2, 0xd, 0x7}, {0x4, 0x1, 0xf, 0x2}, {0x2, 0x4, 0x3, 0x9}, {0x4, 0x1, 0x9, 0xc}, {0x0, 0x5, 0x7, 0x7}], 0x10, 0x100}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x400020, 0x0) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x1) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={r7, 0x1b6a3f04, 0x30}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000ec0)={&(0x7f0000000c80), &(0x7f0000000cc0)=""/22, &(0x7f0000000d00)="019817b40759a2a7de27d1381b1dd6c4070a3774f7c9f872922f1f4bd08001a90b4a490cdc8963e29e309751dfc986e5ec81e4cf66fa4d9ce366f86fcf15a62465dcbe79e4b57512dc0096367dc20cee83381ec9191bb84bbb0d2384b2081d76ee613d11ec6e93904138e95f6725b5ddc15f5228276f4e0a948888a6793c53d65410e809f80ffb401f00750d71e3b7a474f983777d5671b25c9282be45", &(0x7f0000000dc0)="9d29da05daa733970edfa167e0b3d5678f2ef1326e6c2ba65c5d28dd391b4c954a75c6e85ea5465b22344da151711a5d62ffa8e2420854eff4e52c050cabcf1a1796860e52ba08c8df529e2b481e79a15578dc54c0276a058f85a8c53633d16ab7096bd6b6bacf272f124cef8d8a1e39ab2ae36d8b9eb3ca4c28cdcddf3b6bd9fe11f2a6ebd7507fc7045ea02e1731fda09c5e38acda770389408d83bb99534349d927ad28cbdbc1305e90755da3fb494e83335a20b824679c1cb26035f27d", 0x0, r11, 0x4}, 0x38) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f00)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000000) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000f40)={'ip6gre0', 0x32, 0x32}, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11}, &(0x7f0000000f80), &(0x7f0000000fc0)=r11}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={0xffffffffffffffff, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c80)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) [ 1498.627300][ C1] ? prepare_alloc_pages+0x35d/0x5b0 [ 1498.627317][ C1] __alloc_pages+0x272/0x700 [ 1498.627332][ C1] ? __rmqueue_pcplist+0x2030/0x2030 [ 1498.627352][ C1] ? alloc_pages+0x458/0x570 [ 1498.627385][ C1] __vmalloc_node_range+0x5ab/0x8c0 [ 1498.627408][ C1] vmalloc_user+0x70/0x80 [ 1498.627423][ C1] ? kcov_mmap+0x28/0x120 [ 1498.627437][ C1] kcov_mmap+0x28/0x120 [ 1498.627452][ C1] mmap_region+0x10e7/0x1670 [ 1498.627491][ C1] ? file_mmap_ok+0x150/0x150 [ 1498.627506][ C1] ? cap_mmap_addr+0x15e/0x2d0 [ 1498.627544][ C1] ? bpf_lsm_mmap_addr+0x5/0x10 [ 1498.627566][ C1] ? get_unmapped_area+0x317/0x380 [ 1498.627585][ C1] do_mmap+0x78d/0xe00 [ 1498.627605][ C1] vm_mmap_pgoff+0x1ca/0x2d0 [ 1498.627623][ C1] ? account_locked_vm+0xe0/0xe0 [ 1498.627638][ C1] ? __fget_files+0x413/0x480 [ 1498.627657][ C1] ksys_mmap_pgoff+0x559/0x780 [ 1498.627676][ C1] ? mmap_region+0x1670/0x1670 [ 1498.627693][ C1] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1498.627708][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1498.627724][ C1] do_syscall_64+0x3d/0xb0 [ 1498.627740][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1498.627755][ C1] RIP: 0033:0x7f29848e1de3 [ 1498.627768][ C1] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 [ 1498.627781][ C1] RSP: 002b:00007fffe941f938 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1498.627795][ C1] RAX: ffffffffffffffda RBX: 00007f2984a11288 RCX: 00007f29848e1de3 [ 1498.627806][ C1] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1498.627815][ C1] RBP: 00007fffe941fa20 R08: 00000000000000db R09: 0000000000000000 [ 1498.627824][ C1] R10: 0000000000000001 R11: 0000000000000246 R12: 00007fffe9420008 [ 1498.627834][ C1] R13: 0000000000000006 R14: 00007f2984a11288 R15: 0000000000000003 [ 1498.627850][ C1] [ 1499.194539][ T26] Kernel panic - not syncing: hung_task: blocked tasks [ 1499.201408][ T26] CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 1499.209388][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1499.219441][ T26] Call Trace: [ 1499.222721][ T26] [ 1499.225650][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1499.230337][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1499.235973][ T26] ? panic+0x84d/0x84d [ 1499.240052][ T26] panic+0x318/0x84d [ 1499.243945][ T26] ? schedule_preempt_disabled+0x20/0x20 [ 1499.249580][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1499.255738][ T26] ? fb_is_primary_device+0xcc/0xcc [ 1499.260942][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1499.267030][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1499.273190][ T26] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1499.279354][ T26] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1499.285514][ T26] watchdog+0xeb0/0xeb0 [ 1499.289680][ T26] kthread+0x3f6/0x4f0 [ 1499.293750][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1499.298775][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1499.303373][ T26] ret_from_fork+0x1f/0x30 [ 1499.307802][ T26] [ 1499.310966][ T26] Kernel Offset: disabled [ 1499.315284][ T26] Rebooting in 86400 seconds..