_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:33:55 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1065.160179][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1065.390437][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1065.641577][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1065.898464][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1065.981010][T18671] Bluetooth: hci8: command 0x040f tx timeout 15:33:57 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:33:57 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:33:58 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1068.061237][T18670] Bluetooth: hci8: command 0x0419 tx timeout 15:33:59 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1068.609015][T12783] bond0 (unregistering): Released all slaves 15:33:59 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:00 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e", 0x85, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:01 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1071.731054][ T3557] Bluetooth: hci3: command 0x0406 tx timeout [ 1071.741301][ T1932] Bluetooth: hci5: command 0x0406 tx timeout 15:34:02 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1072.552340][T12783] team0 (unregistering): Port device team_slave_1 removed 15:34:03 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1072.871994][T12783] team0 (unregistering): Port device team_slave_0 removed 15:34:03 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1074.332487][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:34:05 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:06 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1075.926542][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:34:06 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:07 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1077.442269][T12783] bond0 (unregistering): Released all slaves 15:34:08 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:08 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1078.691040][T27784] Bluetooth: hci9: command 0x0409 tx timeout 15:34:09 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:10 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1079.811075][ T3557] Bluetooth: hci10: command 0x0409 tx timeout 15:34:10 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1080.321895][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1080.771099][ T3561] Bluetooth: hci9: command 0x041b tx timeout 15:34:11 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1080.900179][T12783] team0 (unregistering): Port device team_slave_0 removed 15:34:11 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1081.471445][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1081.891076][T27784] Bluetooth: hci10: command 0x041b tx timeout 15:34:12 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1082.371484][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1082.850992][T27784] Bluetooth: hci9: command 0x040f tx timeout [ 1083.812569][T12783] bond0 (unregistering): Released all slaves 15:34:14 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1083.971012][T28931] Bluetooth: hci10: command 0x040f tx timeout [ 1084.473413][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 15:34:15 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1084.931116][ T3556] Bluetooth: hci9: command 0x0419 tx timeout [ 1085.149733][T32130] chnl_net:caif_netlink_parms(): no params data found [ 1085.171955][T32575] chnl_net:caif_netlink_parms(): no params data found [ 1085.753527][T32243] chnl_net:caif_netlink_parms(): no params data found [ 1085.775397][T32582] chnl_net:caif_netlink_parms(): no params data found 15:34:16 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1086.051068][ T2924] Bluetooth: hci10: command 0x0419 tx timeout 15:34:17 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:18 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:19 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1089.603765][T32130] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.615341][T32130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.643474][T32130] device bridge_slave_0 entered promiscuous mode [ 1089.713747][T32130] bridge0: port 2(bridge_slave_1) entered blocking state [ 1089.720827][T32130] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.752852][T32130] device bridge_slave_1 entered promiscuous mode 15:34:21 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1090.744207][T32243] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.751710][T32243] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.759897][T32243] device bridge_slave_0 entered promiscuous mode 15:34:21 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1091.714377][T32130] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1091.733328][T32575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1091.743304][T32575] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.767366][T32575] device bridge_slave_0 entered promiscuous mode 15:34:22 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1092.776855][T32243] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.784520][T32243] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.802678][T32243] device bridge_slave_1 entered promiscuous mode [ 1092.975653][T32130] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:34:23 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:24 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1093.698628][T32575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1093.723718][T32575] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.734011][T32575] device bridge_slave_1 entered promiscuous mode [ 1093.762179][T32582] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.769264][T32582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.792127][T32582] device bridge_slave_0 entered promiscuous mode [ 1094.477652][T32130] team0: Port device team_slave_0 added [ 1094.505515][T32582] bridge0: port 2(bridge_slave_1) entered blocking state [ 1094.520984][T32582] bridge0: port 2(bridge_slave_1) entered disabled state [ 1094.529122][T32582] device bridge_slave_1 entered promiscuous mode [ 1094.692124][T32243] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1094.712925][T32130] team0: Port device team_slave_1 added 15:34:25 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1095.236920][T32243] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1095.260571][T32575] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1095.283080][T32582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:34:26 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1095.535392][T32575] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1095.556294][T32582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1095.584985][T32243] team0: Port device team_slave_0 added [ 1095.591905][T32130] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1095.598851][T32130] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1095.641009][T32130] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:34:26 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:26 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:27 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1097.300178][T32243] team0: Port device team_slave_1 added [ 1097.311621][T32130] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1097.318569][T32130] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:34:27 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1097.370913][T32130] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1097.385716][T32575] team0: Port device team_slave_0 added [ 1097.404139][T32582] team0: Port device team_slave_0 added [ 1097.889494][T32575] team0: Port device team_slave_1 added [ 1097.896965][T32582] team0: Port device team_slave_1 added [ 1097.922626][T32243] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1097.929583][T32243] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1097.973740][T32243] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:34:28 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) 15:34:29 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) 15:34:29 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:30 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1099.701084][T32243] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1099.708066][T32243] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1099.771115][T32243] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1100.118486][T32575] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1100.126103][T32575] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1100.183672][T32575] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:34:30 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:31 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1102.151736][T32582] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1102.158717][T32582] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1102.221089][T32582] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1102.245373][T32575] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1102.256539][T32575] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1102.310997][T32575] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1102.342518][T32582] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1102.363610][T32582] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1102.401219][T32582] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:34:33 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1102.914085][T32243] device hsr_slave_0 entered promiscuous mode [ 1103.116723][T32243] device hsr_slave_1 entered promiscuous mode 15:34:33 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:34 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1104.406828][T32575] device hsr_slave_0 entered promiscuous mode 15:34:35 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1104.841588][T32575] device hsr_slave_1 entered promiscuous mode [ 1104.981153][T32575] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1104.988760][T32575] Cannot create hsr debugfs directory 15:34:35 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:36 executing program 0: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1105.891153][ T3557] Bluetooth: hci1: command 0x0409 tx timeout 15:34:36 executing program 0: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1106.218105][T32582] device hsr_slave_0 entered promiscuous mode 15:34:36 executing program 0: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1106.381991][T32582] device hsr_slave_1 entered promiscuous mode [ 1106.559419][T32582] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1106.571036][T32582] Cannot create hsr debugfs directory 15:34:37 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:38 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:38 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1107.971208][ T3556] Bluetooth: hci1: command 0x041b tx timeout 15:34:39 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:40 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1110.051205][T27784] Bluetooth: hci1: command 0x040f tx timeout [ 1110.558951][T32243] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:34:41 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:41 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1111.361645][T32243] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:34:42 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1111.521671][ T502] chnl_net:caif_netlink_parms(): no params data found [ 1111.654922][T32243] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:34:42 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1112.131159][ T3556] Bluetooth: hci1: command 0x0419 tx timeout 15:34:43 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:34:43 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1113.584379][T32243] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1113.654229][ T502] bridge0: port 1(bridge_slave_0) entered blocking state [ 1113.671043][ T502] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.679279][ T502] device bridge_slave_0 entered promiscuous mode 15:34:44 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1113.703283][ T502] bridge0: port 2(bridge_slave_1) entered blocking state [ 1113.720921][ T502] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.729274][ T502] device bridge_slave_1 entered promiscuous mode [ 1113.796494][ T502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1113.823462][ T502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1114.677918][ T502] team0: Port device team_slave_0 added 15:34:45 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1114.963656][ T502] team0: Port device team_slave_1 added 15:34:46 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) [ 1115.741266][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.747578][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 15:34:46 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 15:34:47 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) [ 1117.332020][ T502] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1117.339353][ T502] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1117.401124][ T502] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1117.429153][ T502] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1117.450976][ T502] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1117.500913][ T502] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:34:48 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") 15:34:48 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") [ 1118.795598][ T502] device hsr_slave_0 entered promiscuous mode [ 1118.811929][ T502] device hsr_slave_1 entered promiscuous mode [ 1118.931192][ T502] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1118.938780][ T502] Cannot create hsr debugfs directory 15:34:49 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") 15:34:50 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5e") 15:34:51 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5e") 15:34:52 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5e") 15:34:53 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") 15:34:54 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") 15:34:54 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") 15:34:55 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13") [ 1125.268631][T32582] netdevsim netdevsim4 netdevsim0: renamed from eth0 15:34:56 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13") 15:34:56 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13") [ 1126.151100][T32582] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1126.186769][T32582] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1126.321835][T32582] netdevsim netdevsim4 netdevsim3: renamed from eth3 15:34:56 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519") [ 1126.672768][T32582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1126.712121][ T627] chnl_net:caif_netlink_parms(): no params data found [ 1126.758229][T32582] 8021q: adding VLAN 0 to HW filter on device team0 [ 1126.765762][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1126.781581][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1127.032572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1127.042218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1127.071237][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1127.078324][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1127.111336][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1127.151301][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1127.159720][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1127.166836][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state 15:34:57 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519") [ 1127.211797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1127.231772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1127.262209][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1127.292313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1127.311573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1127.331856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 15:34:58 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519") [ 1127.891322][ T3561] Bluetooth: hci2: command 0x0409 tx timeout 15:34:58 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") [ 1128.371406][T32582] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1128.401039][T32582] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1128.431338][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1128.439388][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1128.461683][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1128.481577][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1128.492290][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1128.511693][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1128.547666][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1128.869686][ T627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1128.881117][ T627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.899155][ T627] device bridge_slave_0 entered promiscuous mode [ 1128.940597][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1128.951305][ T627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.959512][ T627] device bridge_slave_1 entered promiscuous mode 15:34:59 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") [ 1129.438619][ T627] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1129.473945][ T627] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1129.504673][T32582] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1129.791617][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1129.799192][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:35:00 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") [ 1129.981552][T18672] Bluetooth: hci2: command 0x041b tx timeout 15:35:00 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1130.811422][ T627] team0: Port device team_slave_0 added [ 1130.841142][ T627] team0: Port device team_slave_1 added 15:35:01 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1131.038755][ T502] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1131.059424][T32575] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1131.092086][ T627] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1131.099050][ T627] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1131.141359][ T627] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1131.153622][ T502] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1131.174207][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1131.183600][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1131.192744][T32575] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1131.273521][T32575] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1131.301471][ T627] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1131.308432][ T627] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1131.350916][ T627] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1131.362617][ T502] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1131.637932][ T502] netdevsim netdevsim3 netdevsim3: renamed from eth3 15:35:02 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1132.061034][ T1932] Bluetooth: hci2: command 0x040f tx timeout [ 1132.212246][T32575] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1132.526838][T32582] device veth0_vlan entered promiscuous mode [ 1132.545504][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1132.559402][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 15:35:03 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1132.978174][T32582] device veth1_vlan entered promiscuous mode [ 1133.000169][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1133.011811][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 15:35:03 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1133.620415][ T627] device hsr_slave_0 entered promiscuous mode [ 1133.821969][ T627] device hsr_slave_1 entered promiscuous mode 15:35:04 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1133.961162][ T627] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1133.972671][ T627] Cannot create hsr debugfs directory [ 1134.040322][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1134.062214][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1134.131135][T18672] Bluetooth: hci2: command 0x0419 tx timeout [ 1134.727379][T32582] device veth0_macvtap entered promiscuous mode [ 1134.741649][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 15:35:05 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1134.785564][T32582] device veth1_macvtap entered promiscuous mode [ 1135.137408][T32575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1135.178577][T32575] 8021q: adding VLAN 0 to HW filter on device team0 [ 1135.202318][ T502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1135.217733][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1135.226792][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1135.235221][T32582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1135.245794][T32582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.291029][T32582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1135.331739][T32582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.351884][T32582] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1135.380769][T32582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1135.410686][T32582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.430931][T32582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1135.450926][T32582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1135.462952][T32582] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1135.470649][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1135.481243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1135.497439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1135.509628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1135.521465][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1135.528611][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1135.543496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1135.555868][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1135.571130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1135.587763][T32582] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1135.601612][T32582] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1135.610411][T32582] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1135.627462][T32582] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 15:35:06 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1136.345001][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1136.355506][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1136.372500][ T1932] bridge0: port 2(bridge_slave_1) entered blocking state [ 1136.379578][ T1932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1136.387702][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1136.401585][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1136.409484][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1136.418515][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1136.427631][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1136.452809][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1136.461903][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1136.470680][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1136.490950][ T502] 8021q: adding VLAN 0 to HW filter on device team0 [ 1136.497867][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 15:35:07 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:07 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1137.553326][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1137.572290][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1137.580793][ T3556] bridge0: port 1(bridge_slave_0) entered blocking state [ 1137.587910][ T3556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1137.651514][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1137.660270][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1137.693617][ T3556] bridge0: port 2(bridge_slave_1) entered blocking state [ 1137.700695][ T3556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1137.733250][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1137.753695][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1137.812400][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1137.831001][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 15:35:08 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f", 0x79, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1137.855324][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1137.891924][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1137.926304][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1137.951876][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1137.981328][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 15:35:09 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:10 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1140.516370][ T502] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1140.541843][ T502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1140.554519][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 15:35:11 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1140.566584][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1140.591707][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:35:11 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:12 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1142.252998][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1142.260525][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1142.279425][ T502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1142.316067][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1142.328697][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 15:35:12 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1142.357741][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1142.366186][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1142.385063][ T502] device veth0_vlan entered promiscuous mode [ 1142.402251][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1142.410113][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1142.534517][ T502] device veth1_vlan entered promiscuous mode [ 1142.589271][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1142.613011][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1142.621282][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1142.641679][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1142.652611][ T502] device veth0_macvtap entered promiscuous mode [ 1142.672274][ T502] device veth1_macvtap entered promiscuous mode [ 1142.716256][ T502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1142.740892][ T502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1142.750723][ T502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1142.776381][ T502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1142.791194][ T502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1142.804511][ T502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1142.817029][ T502] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1142.825264][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1142.834252][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1142.842456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1142.851334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1142.894441][ T502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1142.923258][ T502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1142.962086][ T502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1142.992047][ T502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.003760][ T502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1143.031179][ T502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1143.052501][ T502] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1143.065789][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1143.081721][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1143.135078][ T502] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1143.152644][ T502] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1143.171247][ T502] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1143.191980][ T502] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 15:35:13 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:14 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:14 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1144.104826][ T886] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1144.122516][ T627] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1144.138195][ T886] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1144.439852][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1144.462712][ T627] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1144.563340][ T627] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1144.649309][ T627] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1144.856341][ T733] chnl_net:caif_netlink_parms(): no params data found [ 1144.858682][T30859] Bluetooth: hci3: command 0x0409 tx timeout [ 1144.869361][T14270] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1144.905377][T14270] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:35:15 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1145.491095][T28931] Bluetooth: hci4: command 0x0409 tx timeout 15:35:16 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1146.101524][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:35:16 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1146.301435][ T627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1146.340584][ T738] chnl_net:caif_netlink_parms(): no params data found 15:35:16 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:17 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r0}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:17 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r0}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:17 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1146.942317][ T21] Bluetooth: hci3: command 0x041b tx timeout 15:35:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r0}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:17 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:18 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1147.571198][ T21] Bluetooth: hci4: command 0x041b tx timeout [ 1147.610119][ T627] 8021q: adding VLAN 0 to HW filter on device team0 [ 1147.642120][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1147.671849][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1147.679849][ T733] bridge0: port 1(bridge_slave_0) entered blocking state [ 1147.701441][ T733] bridge0: port 1(bridge_slave_0) entered disabled state [ 1147.709845][ T733] device bridge_slave_0 entered promiscuous mode 15:35:18 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:18 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:18 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1148.307254][ T733] bridge0: port 2(bridge_slave_1) entered blocking state [ 1148.314409][ T733] bridge0: port 2(bridge_slave_1) entered disabled state [ 1148.343539][ T733] device bridge_slave_1 entered promiscuous mode 15:35:19 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, 0x0, &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:19 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, 0x0, &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:19 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1149.011690][T18671] Bluetooth: hci3: command 0x040f tx timeout [ 1149.055034][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1149.071653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1149.111505][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1149.118586][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state 15:35:19 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1149.651147][ T21] Bluetooth: hci4: command 0x040f tx timeout 15:35:20 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:20 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078ef", 0xb5, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:21 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1150.713402][ T738] bridge0: port 1(bridge_slave_0) entered blocking state [ 1150.728219][ T738] bridge0: port 1(bridge_slave_0) entered disabled state [ 1150.751158][ T738] device bridge_slave_0 entered promiscuous mode [ 1150.769380][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1150.777702][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1150.801666][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1150.810082][T28931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1150.817200][T28931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1150.871350][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1150.880186][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1150.914538][ T733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1150.942184][ T738] bridge0: port 2(bridge_slave_1) entered blocking state [ 1150.949299][ T738] bridge0: port 2(bridge_slave_1) entered disabled state [ 1150.973746][ T738] device bridge_slave_1 entered promiscuous mode [ 1151.091073][T18671] Bluetooth: hci3: command 0x0419 tx timeout 15:35:21 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:22 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1151.741664][ T3560] Bluetooth: hci4: command 0x0419 tx timeout 15:35:22 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:23 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:23 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:23 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1153.273907][ T733] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1153.291317][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1153.311148][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1153.322396][ T738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1153.354836][ T738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:35:24 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:24 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:25 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1155.462877][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1155.471364][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1155.480187][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1155.515803][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1155.532602][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 15:35:26 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:27 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:27 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1156.704502][ T733] team0: Port device team_slave_0 added [ 1156.714063][ T627] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1156.751857][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1156.791874][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1156.811468][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1156.835604][ T738] team0: Port device team_slave_0 added [ 1156.860801][ T733] team0: Port device team_slave_1 added [ 1157.504404][ T738] team0: Port device team_slave_1 added 15:35:28 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1157.626061][ T733] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1157.641033][ T733] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1157.710726][ T733] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:35:28 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:28 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:29 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:29 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1159.062924][ T733] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1159.069887][ T733] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1159.139709][ T733] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1159.175707][ T738] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1159.197603][ T738] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1159.225804][ T738] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1159.249552][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1159.260186][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1159.271925][ T738] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1159.278871][ T738] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1159.307788][ T738] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1159.324642][ T627] 8021q: adding VLAN 0 to HW filter on device batadv0 15:35:31 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:31 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:31 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1161.829147][ T733] device hsr_slave_0 entered promiscuous mode 15:35:32 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x0, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1162.522897][ T733] device hsr_slave_1 entered promiscuous mode [ 1162.803579][ T733] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1162.811285][ T733] Cannot create hsr debugfs directory 15:35:34 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x0, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:34 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x0, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1163.916782][ T738] device hsr_slave_0 entered promiscuous mode [ 1164.305689][ T738] device hsr_slave_1 entered promiscuous mode [ 1164.921047][ T738] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1164.928635][ T738] Cannot create hsr debugfs directory [ 1164.961221][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1164.971600][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1165.009119][ T627] device veth0_vlan entered promiscuous mode [ 1166.306580][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1166.317081][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1166.596897][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1166.612305][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1166.676872][ T627] device veth1_vlan entered promiscuous mode [ 1166.781513][T27784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1166.791639][T27784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1166.820694][ T627] device veth0_macvtap entered promiscuous mode [ 1166.863505][ T738] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1166.895297][ T627] device veth1_macvtap entered promiscuous mode [ 1166.964186][ T738] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1167.015010][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1167.054384][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.087228][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1167.100647][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.111858][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1167.123944][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.135187][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1167.145984][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.158334][ T627] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1167.171051][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1167.179223][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1167.196337][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1167.206236][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1167.224048][ T738] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1167.243083][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1167.270980][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.281447][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1167.300351][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.330966][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1167.350989][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.360821][ T627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1167.374800][ T627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1167.386049][ T627] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1167.393847][T27784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1167.406440][T27784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1167.422875][ T627] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1167.432711][ T627] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1167.441777][ T627] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1167.450466][ T627] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1167.467683][ T738] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1167.540704][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1167.552561][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1167.575173][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 15:35:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1167.601937][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1167.611073][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1167.627426][T12783] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1167.643768][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:35:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1167.708425][T12783] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1167.810700][T12783] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:35:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x0, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1167.953919][T12783] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:35:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x0, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1168.126838][T12783] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1168.298912][T12783] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:35:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x0, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1168.430830][T12783] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:35:39 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x0, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1168.827429][T12783] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:35:39 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x0, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1169.186957][ T733] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1169.286144][ T1165] chnl_net:caif_netlink_parms(): no params data found [ 1169.303026][ T733] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1169.384684][ T733] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1169.464306][ T733] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1169.635848][ T738] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1169.660910][ T1178] chnl_net:caif_netlink_parms(): no params data found 15:35:40 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x0, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1169.705957][ T738] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1169.911549][ T738] netdevsim netdevsim4 netdevsim2: renamed from eth2 15:35:40 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1169.965866][ T1165] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.981041][ T1165] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.989423][ T1165] device bridge_slave_0 entered promiscuous mode [ 1170.032992][ T738] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1170.088014][ T1165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.095360][ T1165] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.113898][ T1165] device bridge_slave_1 entered promiscuous mode 15:35:40 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1170.483587][ T1178] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.490678][ T1178] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.512472][ T1178] device bridge_slave_0 entered promiscuous mode [ 1170.532884][ T1165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1170.543361][ T21] Bluetooth: hci0: command 0x0409 tx timeout [ 1170.574743][ T733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1170.601697][ T1178] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.608768][ T1178] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.625695][ T1178] device bridge_slave_1 entered promiscuous mode [ 1170.653209][ T1165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:35:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1170.701270][T18671] Bluetooth: hci1: command 0x0409 tx timeout 15:35:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1171.217380][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1171.231775][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:35:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1171.263109][ T733] 8021q: adding VLAN 0 to HW filter on device team0 [ 1171.272600][ T1178] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1171.292002][ T1165] team0: Port device team_slave_0 added [ 1171.299581][ T1165] team0: Port device team_slave_1 added [ 1171.351259][ T1178] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1171.445458][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1171.459679][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1171.477263][ T21] bridge0: port 1(bridge_slave_0) entered blocking state [ 1171.484373][ T21] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1171.504239][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1171.518087][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1171.531418][ T21] bridge0: port 2(bridge_slave_1) entered blocking state [ 1171.538479][ T21] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1171.561431][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1171.570289][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1171.586742][ T738] 8021q: adding VLAN 0 to HW filter on device bond0 15:35:42 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:42 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1172.035940][ T1178] team0: Port device team_slave_0 added [ 1172.049242][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1172.205065][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1172.232046][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1172.247430][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1172.272461][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1172.282035][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1172.290480][ T1932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1172.329769][ T738] 8021q: adding VLAN 0 to HW filter on device team0 [ 1172.349274][ T1165] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1172.358158][ T1165] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:35:42 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1172.420887][ T1165] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1172.445980][ T733] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1172.461655][ T733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1172.485009][ T1178] team0: Port device team_slave_1 added [ 1172.501267][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1172.611381][ T1200] Bluetooth: hci0: command 0x041b tx timeout [ 1172.723296][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1172.737083][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1172.751722][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1172.769823][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1172.772780][ T1200] Bluetooth: hci1: command 0x041b tx timeout [ 1172.791624][ T1165] batman_adv: batadv0: Adding interface: batadv_slave_1 15:35:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1172.798578][ T1165] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1172.861096][ T1165] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:35:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1173.368076][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1173.376882][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1173.394745][ T3560] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.401854][ T3560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.418512][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1173.433134][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1173.446575][ T3560] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.453676][ T3560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.470922][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1173.479734][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1173.498979][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1173.514057][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1173.528572][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1173.542123][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1173.550709][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:35:44 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1173.570087][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1173.591630][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1173.611575][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1173.620645][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1173.651692][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1173.675664][ T1178] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1173.687346][ T1178] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1173.751023][ T1178] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1173.786431][ T1178] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1173.793498][ T1178] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1173.819985][ T1178] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:35:44 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1174.444103][ T1165] device hsr_slave_0 entered promiscuous mode 15:35:45 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1174.621989][ T1165] device hsr_slave_1 entered promiscuous mode [ 1174.691180][ T3561] Bluetooth: hci0: command 0x040f tx timeout [ 1174.781125][ T1165] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1174.789402][ T1165] Cannot create hsr debugfs directory [ 1174.851041][ T1203] Bluetooth: hci1: command 0x040f tx timeout 15:35:45 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1175.011542][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1175.019108][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:35:45 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1175.363850][ T733] 8021q: adding VLAN 0 to HW filter on device batadv0 15:35:46 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1175.605744][ T1178] device hsr_slave_0 entered promiscuous mode [ 1175.771534][ T1178] device hsr_slave_1 entered promiscuous mode 15:35:46 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1175.878879][ T1178] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1175.891377][ T1178] Cannot create hsr debugfs directory [ 1175.945634][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1175.961749][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1176.377756][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1176.391313][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1176.398861][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 15:35:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1176.431782][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1176.470512][ T738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1176.771128][T28931] Bluetooth: hci0: command 0x0419 tx timeout [ 1176.852307][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1176.860242][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1176.882299][ T733] device veth0_vlan entered promiscuous mode [ 1176.931195][ T1204] Bluetooth: hci1: command 0x0419 tx timeout [ 1176.950678][ T733] device veth1_vlan entered promiscuous mode 15:35:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078ef", 0xb5, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1177.181233][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.187548][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 [ 1177.827305][ T733] device veth0_macvtap entered promiscuous mode [ 1177.855180][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1177.865717][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1177.896835][ T733] device veth1_macvtap entered promiscuous mode 15:35:48 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078ef", 0xb5, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1178.436032][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1178.782875][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1178.801156][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.820912][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 15:35:49 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078ef", 0xb5, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1178.840893][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.850774][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1178.895106][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.905120][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1178.934255][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.944129][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1178.969788][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.992565][ T733] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1178.999983][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1179.011983][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1179.040993][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1179.049816][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1179.099617][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1179.119106][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1179.140898][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1179.168639][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1179.185078][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1179.226049][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1179.253581][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1179.270889][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1179.280714][ T733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1179.315418][ T733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1179.343522][ T733] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1179.401469][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1179.410743][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1179.459580][ T733] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1179.490886][ T733] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1179.500061][ T733] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1179.530905][ T733] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1179.565168][T18669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1179.574143][T18669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1179.612458][T18669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1179.620407][T18669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1179.665979][ T738] device veth0_vlan entered promiscuous mode 15:35:50 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1180.479247][ T738] device veth1_vlan entered promiscuous mode [ 1180.503770][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 15:35:51 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1181.647295][ T738] device veth0_macvtap entered promiscuous mode [ 1181.682066][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1181.690814][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 15:35:52 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:52 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac7", 0xbe, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:53 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac7", 0xbe, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1183.634555][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1183.769211][ T738] device veth1_macvtap entered promiscuous mode [ 1183.783133][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1183.800345][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1183.824743][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1183.846349][ T1470] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1183.874207][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1183.885161][ T1470] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1183.910997][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.933049][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1183.950914][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.960785][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 15:35:54 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac7", 0xbe, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1183.992857][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.030918][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1184.060990][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.070824][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1184.090898][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.110927][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1184.131092][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.162552][ T738] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1184.170316][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1184.191793][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1184.201581][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 15:35:54 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1184.225974][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1184.263122][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:35:54 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1184.282150][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1184.324233][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.353333][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 15:35:54 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1184.381424][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.420997][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1184.451008][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.483152][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 15:35:55 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1184.500951][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.512097][ T738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1184.540933][ T738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1184.554400][ T738] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1184.566120][ T738] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.583943][ T738] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.611189][ T738] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.630926][ T738] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.647163][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 15:35:55 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1184.661749][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:35:55 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:55 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:55 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:56 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:56 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:56 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1186.231508][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1186.239740][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1186.278713][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1186.280578][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 15:35:56 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1186.320941][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1186.330230][T18669] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:35:56 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:57 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:58 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:58 executing program 1: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:58 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:58 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:58 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:58 executing program 1: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:59 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:59 executing program 1: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:59 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:59 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:59 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:35:59 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:00 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:00 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:01 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:01 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:01 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:02 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:02 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:02 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:03 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:03 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, 0x0, &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:03 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:03 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:04 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:05 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:05 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, 0x0, &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:05 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:06 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:06 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, 0x0, &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:06 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:07 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:07 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:08 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:08 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:09 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:09 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900), &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:09 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:09 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900), &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:10 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:10 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900), &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:11 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), 0x0) 15:36:11 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:12 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:12 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:13 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), 0x0) 15:36:14 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:14 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), 0x0) 15:36:14 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:15 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:16 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:16 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) [ 1206.524206][ T1165] netdevsim netdevsim0 netdevsim0: renamed from eth0 15:36:17 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:17 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1207.120598][ T1165] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1207.406989][ T1165] netdevsim netdevsim0 netdevsim2: renamed from eth2 15:36:18 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 15:36:18 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:18 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1207.842272][ T1165] netdevsim netdevsim0 netdevsim3: renamed from eth3 15:36:19 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:19 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 15:36:19 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:19 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:21 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:21 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") 15:36:21 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:22 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") 15:36:22 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:22 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:23 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") 15:36:23 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:23 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:23 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5e") 15:36:24 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:24 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:24 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5e") 15:36:25 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:25 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1214.885068][ T1178] netdevsim netdevsim3 netdevsim0: renamed from eth0 15:36:25 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5e") [ 1215.729033][ T1178] netdevsim netdevsim3 netdevsim1: renamed from eth1 15:36:26 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:26 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:26 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") [ 1216.455973][ T1178] netdevsim netdevsim3 netdevsim2: renamed from eth2 15:36:27 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") [ 1217.216016][ T1178] netdevsim netdevsim3 netdevsim3: renamed from eth3 15:36:27 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:27 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:28 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be") [ 1218.246501][ T1165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1218.304888][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1218.313329][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1218.347735][ T1165] 8021q: adding VLAN 0 to HW filter on device team0 15:36:28 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1218.413128][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1218.432078][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1218.481213][ T3561] bridge0: port 1(bridge_slave_0) entered blocking state [ 1218.488289][ T3561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1218.531432][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1218.561414][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1218.570202][ T3561] bridge0: port 2(bridge_slave_1) entered blocking state [ 1218.577326][ T3561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1218.650430][ T1178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1218.671366][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1218.680048][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1218.701965][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1218.741909][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1218.762596][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 15:36:29 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1218.803334][ T1165] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1218.842240][ T1165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1218.873540][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1218.882310][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1218.914138][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1218.932961][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:36:29 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13") [ 1218.963112][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1218.986465][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1219.030963][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1219.051634][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1219.073028][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1219.113373][ T1178] 8021q: adding VLAN 0 to HW filter on device team0 [ 1219.129503][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1219.176147][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1219.199152][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1219.242560][ T1066] bridge0: port 1(bridge_slave_0) entered blocking state [ 1219.249641][ T1066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1219.286798][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1219.302803][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1219.335703][ T1066] bridge0: port 2(bridge_slave_1) entered blocking state [ 1219.342842][ T1066] bridge0: port 2(bridge_slave_1) entered forwarding state 15:36:29 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1219.387684][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1219.456493][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1219.471644][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1219.501820][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1219.532267][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1219.572049][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1219.591676][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1219.639995][ T1178] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1219.721183][ T1178] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1219.757647][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1219.765819][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1219.831899][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1219.852392][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1219.871508][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1219.911610][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1219.919207][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1219.981426][ T1165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1220.012205][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1220.055208][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1220.065827][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1220.128044][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1220.164076][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1220.203789][ T1165] device veth0_vlan entered promiscuous mode [ 1220.220610][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1220.236005][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1220.268112][ T1165] device veth1_vlan entered promiscuous mode [ 1220.364022][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1220.376498][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1220.421922][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1220.454163][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1220.474511][ T1165] device veth0_macvtap entered promiscuous mode [ 1220.510322][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1220.521890][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1220.529436][T28931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:36:31 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1220.574811][ T1165] device veth1_macvtap entered promiscuous mode [ 1220.600509][ T1178] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1220.653662][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 15:36:31 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13") [ 1220.704625][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1220.742217][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1220.781059][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1220.841657][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1220.871266][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1220.914249][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1220.940905][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1220.961015][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1221.000928][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.010778][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1221.061113][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.091839][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1221.131073][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.163130][ T1165] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1221.211786][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1221.231203][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1221.260464][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1221.283983][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1221.305396][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1221.352197][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.381056][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1221.402111][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.443083][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1221.471049][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.521056][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1221.538501][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.566524][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1221.610930][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:36:32 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13") [ 1221.620778][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 15:36:32 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1221.691220][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.731347][ T1165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1221.778744][ T1165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1221.812597][ T1165] batman_adv: batadv0: Interface activated: batadv_slave_1 15:36:32 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1221.826942][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1221.851794][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1221.898482][ T1178] device veth0_vlan entered promiscuous mode [ 1221.924232][ T1165] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.936257][ T1165] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.962228][ T1165] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.988864][ T1165] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1222.022172][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1222.030579][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1222.057323][ T1178] device veth1_vlan entered promiscuous mode [ 1222.094100][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1222.148447][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1222.161745][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 15:36:33 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:33 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519") 15:36:33 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:34 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1223.778800][ T1200] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1223.799900][ T1178] device veth0_macvtap entered promiscuous mode [ 1223.809760][ T1178] device veth1_macvtap entered promiscuous mode 15:36:34 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519") 15:36:34 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1224.442532][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1224.481302][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1224.521456][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1224.550137][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1224.595157][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1224.621011][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1224.660974][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1224.698730][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1224.730872][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1224.740711][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1224.811046][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1224.837107][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1224.882219][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1224.920385][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1224.941046][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1224.955762][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1224.970952][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1224.980787][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 15:36:35 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1225.008575][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.031791][ T1178] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1225.046534][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1225.071499][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1225.092054][T18671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1225.113259][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.128275][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.150867][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.185446][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.200222][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.224200][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.245341][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.270986][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.303295][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.320917][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.340881][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.360919][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.384646][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.419171][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.432300][ T1178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1225.493186][ T1178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1225.510979][ T1178] batman_adv: batadv0: Interface activated: batadv_slave_1 15:36:36 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519") [ 1225.536683][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1225.547793][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1225.581452][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1225.589637][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1225.611833][ T1178] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1225.620564][ T1178] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1225.664255][ T1178] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1225.700878][ T1178] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1225.752663][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 15:36:36 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1226.045885][ T3645] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1226.060904][ T3645] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:36:37 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:37 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:37 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1227.582732][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:36:38 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:38 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:39 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:39 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:41 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:41 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) 15:36:42 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:42 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) 15:36:43 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:43 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) 15:36:44 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) 15:36:44 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) 15:36:46 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:46 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1236.771089][ T3561] Bluetooth: hci0: command 0x0409 tx timeout 15:36:47 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) [ 1237.021295][ T1932] Bluetooth: hci1: command 0x0409 tx timeout 15:36:47 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:48 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:48 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) 15:36:48 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:48 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) 15:36:48 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1238.614409][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.620733][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 [ 1238.856418][ T1066] Bluetooth: hci0: command 0x041b tx timeout [ 1239.093542][ T1200] Bluetooth: hci1: command 0x041b tx timeout [ 1239.165021][ T2387] chnl_net:caif_netlink_parms(): no params data found 15:36:50 executing program 2: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1239.883790][ T2390] chnl_net:caif_netlink_parms(): no params data found 15:36:51 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1240.628336][ T2387] bridge0: port 1(bridge_slave_0) entered blocking state [ 1240.651503][ T2387] bridge0: port 1(bridge_slave_0) entered disabled state [ 1240.699184][ T2387] device bridge_slave_0 entered promiscuous mode [ 1240.744196][ T2387] bridge0: port 2(bridge_slave_1) entered blocking state [ 1240.751418][ T2387] bridge0: port 2(bridge_slave_1) entered disabled state [ 1240.759624][ T2387] device bridge_slave_1 entered promiscuous mode [ 1240.931015][ T3561] Bluetooth: hci0: command 0x040f tx timeout 15:36:51 executing program 2: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1241.171342][ T3561] Bluetooth: hci1: command 0x040f tx timeout 15:36:52 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:52 executing program 2: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 15:36:52 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:52 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:53 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) [ 1243.010993][ T1208] Bluetooth: hci0: command 0x0419 tx timeout [ 1243.250971][ T1208] Bluetooth: hci1: command 0x0419 tx timeout 15:36:53 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:54 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:54 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) [ 1244.047586][ T2387] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1244.091190][ T2390] bridge0: port 1(bridge_slave_0) entered blocking state [ 1244.098267][ T2390] bridge0: port 1(bridge_slave_0) entered disabled state [ 1244.107196][ T2390] device bridge_slave_0 entered promiscuous mode [ 1244.162586][ T2387] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1244.180692][ T2390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1244.190194][ T2390] bridge0: port 2(bridge_slave_1) entered disabled state [ 1244.209378][ T2390] device bridge_slave_1 entered promiscuous mode 15:36:54 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:55 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) [ 1244.698979][ T2387] team0: Port device team_slave_0 added [ 1244.750101][ T2390] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1244.782373][ T2387] team0: Port device team_slave_1 added 15:36:55 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:55 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1245.125981][ T2390] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1245.144708][ T2387] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1245.171020][ T2387] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1245.271079][ T2387] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:36:56 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:56 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:57 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:57 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:57 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:58 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:58 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:58 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:58 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:59 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:36:59 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:00 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:00 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:00 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1250.931038][ T3561] Bluetooth: hci2: command 0x0406 tx timeout 15:37:01 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:02 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:02 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:02 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:02 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1252.457655][ T2387] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1252.473086][ T2387] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:37:03 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1252.540122][ T2387] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1252.920245][ T2390] team0: Port device team_slave_0 added [ 1252.928392][ T2390] team0: Port device team_slave_1 added 15:37:03 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={0x0}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:04 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x0, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:05 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:06 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:07 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1256.912702][ T2387] device hsr_slave_0 entered promiscuous mode 15:37:07 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1257.690047][ T2387] device hsr_slave_1 entered promiscuous mode 15:37:08 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:08 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1257.960554][ T2387] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1257.990756][ T2387] Cannot create hsr debugfs directory 15:37:09 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:09 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:10 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:10 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:11 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:12 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:13 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1262.493385][ T2390] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1262.502745][ T2390] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1262.596099][ T2390] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:37:13 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1263.035650][ T2390] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1263.063533][ T2390] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1263.161010][ T2390] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:37:14 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5e") 15:37:14 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3", 0x61, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:15 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1266.291008][ T3561] Bluetooth: hci4: command 0x0406 tx timeout 15:37:17 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:17 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430") [ 1267.439119][ T2390] device hsr_slave_0 entered promiscuous mode 15:37:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:18 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1267.943500][ T2390] device hsr_slave_1 entered promiscuous mode [ 1268.103455][ T2390] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1268.115799][ T2390] Cannot create hsr debugfs directory 15:37:19 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:21 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:21 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:22 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:22 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1274.385841][ T2387] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:37:28 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:28 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc", 0xa9, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:28 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1277.817795][ T2387] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:37:31 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1281.170900][ T1066] Bluetooth: hci3: command 0x0409 tx timeout 15:37:32 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:33 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), 0x0) [ 1283.250888][ T1208] Bluetooth: hci3: command 0x041b tx timeout 15:37:35 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), 0x0) [ 1285.331295][ T1066] Bluetooth: hci3: command 0x040f tx timeout 15:37:35 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:37 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), 0x0) [ 1287.411039][ T3561] Bluetooth: hci3: command 0x0419 tx timeout 15:37:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1289.081300][ T2387] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:37:39 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1290.099972][ T2831] chnl_net:caif_netlink_parms(): no params data found 15:37:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:42 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), 0x0, &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1292.978477][ T2387] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:37:44 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, 0x0, &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:46 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, 0x0, &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1296.142400][ T2831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1296.149478][ T2831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1296.187027][ T2831] device bridge_slave_0 entered promiscuous mode [ 1296.222882][ T2831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1296.240907][ T2831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1296.249180][ T2831] device bridge_slave_1 entered promiscuous mode 15:37:47 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1297.937691][ T2831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1297.949477][ T2831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:37:49 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1300.053659][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1300.059973][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 15:37:50 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:53 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078ef", 0xb5, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:37:53 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1302.861236][T18669] Bluetooth: hci4: command 0x0409 tx timeout [ 1303.036985][ T2390] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.091079][ T1066] Bluetooth: hci5: command 0x0409 tx timeout [ 1303.577843][ T2831] team0: Port device team_slave_0 added [ 1304.941126][T18672] Bluetooth: hci4: command 0x041b tx timeout [ 1305.182474][T18671] Bluetooth: hci5: command 0x041b tx timeout [ 1306.301022][T18672] Bluetooth: hci0: command 0x0409 tx timeout [ 1306.634451][ T2831] team0: Port device team_slave_1 added 15:37:57 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1307.021187][T18669] Bluetooth: hci4: command 0x040f tx timeout [ 1307.250915][T18669] Bluetooth: hci5: command 0x040f tx timeout [ 1308.057474][ T2390] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1308.387511][T18672] Bluetooth: hci0: command 0x041b tx timeout [ 1309.091102][T18672] Bluetooth: hci4: command 0x0419 tx timeout [ 1309.340859][T18672] Bluetooth: hci5: command 0x0419 tx timeout 15:38:00 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1310.461062][T18672] Bluetooth: hci0: command 0x040f tx timeout [ 1312.531119][T18671] Bluetooth: hci0: command 0x0419 tx timeout [ 1312.581885][ T2390] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1312.754210][ T2831] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1312.770965][ T2831] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1312.860839][ T2831] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1312.943925][ T2831] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1312.960826][ T2831] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1313.036498][ T2831] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:38:04 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1316.222223][ T2390] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1316.867421][ T2831] device hsr_slave_0 entered promiscuous mode 15:38:07 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1317.231418][ T2831] device hsr_slave_1 entered promiscuous mode [ 1317.825805][ T2831] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1317.850654][ T2831] Cannot create hsr debugfs directory [ 1319.416848][ T2929] chnl_net:caif_netlink_parms(): no params data found 15:38:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:13 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:16 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac72177", 0xc0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1329.606969][ T2925] chnl_net:caif_netlink_parms(): no params data found 15:38:21 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1331.398878][ T2831] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1331.491768][ T2929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1331.498854][ T2929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1331.525997][ T2929] device bridge_slave_0 entered promiscuous mode [ 1331.549515][ T2974] chnl_net:caif_netlink_parms(): no params data found [ 1331.701512][ T2929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1331.708598][ T2929] bridge0: port 2(bridge_slave_1) entered disabled state [ 1331.733686][ T2929] device bridge_slave_1 entered promiscuous mode [ 1332.804005][ T2929] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1334.034002][ T2831] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1334.152157][ T2929] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1335.854062][ T2925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1335.870896][ T2925] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.879164][ T2925] device bridge_slave_0 entered promiscuous mode [ 1335.895428][ T2929] team0: Port device team_slave_0 added [ 1337.031561][ T2831] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:38:27 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:28 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1337.977395][ T2925] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.990990][ T2925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.999328][ T2925] device bridge_slave_1 entered promiscuous mode [ 1338.032901][ T2929] team0: Port device team_slave_1 added [ 1338.372076][ T2831] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1338.550693][ T2974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1338.557881][ T2974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.579317][ T2974] device bridge_slave_0 entered promiscuous mode [ 1339.542831][ T2929] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1339.550507][ T2929] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1339.610962][ T2929] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1339.631690][ T2974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1339.638772][ T2974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.661089][ T2974] device bridge_slave_1 entered promiscuous mode 15:38:30 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1340.013584][ T2925] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1340.045298][ T2929] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1340.071743][ T2929] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1340.120797][ T2929] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1340.407374][ T2974] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1340.428983][ T2925] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1340.750656][ T2974] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:38:32 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1342.489793][ T2925] team0: Port device team_slave_0 added 15:38:33 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:34 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac7", 0xbe, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1345.250690][ T2929] device hsr_slave_0 entered promiscuous mode [ 1345.336324][ T2929] device hsr_slave_1 entered promiscuous mode [ 1345.480960][ T2929] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1345.492091][ T2929] Cannot create hsr debugfs directory [ 1345.941448][ T2925] team0: Port device team_slave_1 added [ 1346.418301][ T2974] team0: Port device team_slave_0 added 15:38:37 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac7", 0xbe, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1347.180999][T18672] Bluetooth: hci1: command 0x0409 tx timeout [ 1347.702604][ T2974] team0: Port device team_slave_1 added 15:38:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1348.473269][ T2925] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1348.480322][ T2925] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1348.534824][ T2925] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1349.016466][ T2974] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1349.039685][ T2974] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1349.095655][ T2974] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1349.132309][ T2925] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1349.139302][ T2925] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1349.220986][ T2925] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1349.258453][ T2974] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1349.265722][ T1932] Bluetooth: hci1: command 0x041b tx timeout 15:38:39 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1349.293524][ T2974] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1349.400903][ T2974] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:38:40 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f3499", 0xbb, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144", 0x91, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1351.341122][ T21] Bluetooth: hci1: command 0x040f tx timeout 15:38:42 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100), 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1353.411045][T18669] Bluetooth: hci1: command 0x0419 tx timeout 15:38:44 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x0, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1353.537400][ T2974] device hsr_slave_0 entered promiscuous mode [ 1353.575137][ T2974] device hsr_slave_1 entered promiscuous mode [ 1353.601022][ T2974] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1353.608698][ T2974] Cannot create hsr debugfs directory [ 1353.708860][ T2925] device hsr_slave_0 entered promiscuous mode [ 1353.751266][ T2925] device hsr_slave_1 entered promiscuous mode [ 1353.762453][ T2925] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1353.790815][ T2925] Cannot create hsr debugfs directory 15:38:45 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x0, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:45 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x0, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:46 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, 0xffffffffffffffff, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1357.789431][ T2974] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1357.899669][ T2929] netdevsim netdevsim3 netdevsim0: renamed from eth0 15:38:48 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:49 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1359.020234][T12783] device hsr_slave_0 left promiscuous mode [ 1359.031870][T12783] device hsr_slave_1 left promiscuous mode [ 1359.051295][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1359.077136][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1359.293456][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1359.308394][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1359.508790][T12783] device bridge_slave_1 left promiscuous mode [ 1359.522721][T12783] bridge0: port 2(bridge_slave_1) entered disabled state 15:38:50 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1359.941436][T12783] device bridge_slave_0 left promiscuous mode [ 1359.947683][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:38:50 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1360.807844][T12783] device hsr_slave_0 left promiscuous mode 15:38:51 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1361.091299][T12783] device hsr_slave_1 left promiscuous mode [ 1361.281748][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1361.289314][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1361.363247][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1361.380835][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 15:38:51 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1361.492190][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.498494][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 [ 1361.553101][T12783] device bridge_slave_1 left promiscuous mode [ 1361.559711][T12783] bridge0: port 2(bridge_slave_1) entered disabled state 15:38:52 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1362.302042][T12783] device bridge_slave_0 left promiscuous mode [ 1362.308251][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:38:53 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1363.296268][T12783] device hsr_slave_0 left promiscuous mode 15:38:53 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1363.628382][T12783] device hsr_slave_1 left promiscuous mode [ 1363.838463][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1363.850703][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1363.906221][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1363.920650][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1364.009342][T12783] device bridge_slave_1 left promiscuous mode [ 1364.015593][T12783] bridge0: port 2(bridge_slave_1) entered disabled state 15:38:54 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1364.461726][T12783] device bridge_slave_0 left promiscuous mode [ 1364.467943][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:38:55 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:38:55 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1365.649365][T12783] device hsr_slave_0 left promiscuous mode 15:38:56 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1366.190498][T12783] device hsr_slave_1 left promiscuous mode [ 1366.849863][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 15:38:57 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1367.263467][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1367.442526][T12783] device bridge_slave_1 left promiscuous mode [ 1367.448734][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.556080][T12783] device bridge_slave_0 left promiscuous mode [ 1367.564830][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:38:58 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1368.701201][ T1932] Bluetooth: hci3: command 0x0409 tx timeout [ 1368.721589][T12783] device hsr_slave_0 left promiscuous mode [ 1368.730594][T12783] device hsr_slave_1 left promiscuous mode [ 1368.737348][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1368.783459][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1368.813005][T12783] device bridge_slave_1 left promiscuous mode [ 1368.819203][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.011011][T18672] Bluetooth: hci6: command 0x0409 tx timeout [ 1369.223914][T12783] device bridge_slave_0 left promiscuous mode [ 1369.230177][T12783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.549246][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1369.632905][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1370.117319][T12783] device bridge_slave_1 left promiscuous mode [ 1370.130919][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.487805][T12783] device bridge_slave_0 left promiscuous mode [ 1370.500991][T12783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.771079][T18669] Bluetooth: hci3: command 0x041b tx timeout [ 1370.914935][T12783] device hsr_slave_0 left promiscuous mode 15:39:01 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1371.091413][ T1932] Bluetooth: hci6: command 0x041b tx timeout [ 1371.171441][T12783] device hsr_slave_1 left promiscuous mode [ 1371.521171][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 15:39:02 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1371.596129][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1371.843216][T12783] device bridge_slave_1 left promiscuous mode [ 1371.849452][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1372.066767][T12783] device bridge_slave_0 left promiscuous mode [ 1372.080912][T12783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1372.291418][T18672] Bluetooth: hci7: command 0x0409 tx timeout 15:39:03 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1372.836385][T12783] device hsr_slave_0 left promiscuous mode [ 1372.861170][T18672] Bluetooth: hci3: command 0x040f tx timeout [ 1373.132441][T12783] device hsr_slave_1 left promiscuous mode [ 1373.171018][T18672] Bluetooth: hci6: command 0x040f tx timeout 15:39:03 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1373.297991][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1373.463074][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1373.626742][T12783] device bridge_slave_1 left promiscuous mode [ 1373.640976][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1373.708782][T12783] device bridge_slave_0 left promiscuous mode [ 1373.721060][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:39:04 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1374.370999][T18672] Bluetooth: hci7: command 0x041b tx timeout [ 1374.414849][T12783] device hsr_slave_0 left promiscuous mode [ 1374.425362][T12783] device hsr_slave_1 left promiscuous mode [ 1374.437679][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1374.455156][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1374.513247][T12783] device bridge_slave_1 left promiscuous mode [ 1374.519441][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.539613][T12783] device bridge_slave_0 left promiscuous mode [ 1374.550486][T12783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.594427][T12783] device hsr_slave_0 left promiscuous mode [ 1374.604151][T12783] device hsr_slave_1 left promiscuous mode [ 1374.675992][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1374.687195][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 15:39:05 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1374.833452][T12783] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1374.851046][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1374.931639][T18672] Bluetooth: hci3: command 0x0419 tx timeout [ 1375.079887][T12783] device bridge_slave_1 left promiscuous mode [ 1375.093648][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.250930][T18672] Bluetooth: hci6: command 0x0419 tx timeout [ 1375.384634][T12783] device bridge_slave_0 left promiscuous mode [ 1375.394451][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:39:06 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:06 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1376.460983][ T1932] Bluetooth: hci7: command 0x040f tx timeout [ 1376.711037][T12783] device hsr_slave_0 left promiscuous mode [ 1377.108654][T12783] device hsr_slave_1 left promiscuous mode 15:39:07 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1377.611542][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1378.110489][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1378.428881][T12783] device bridge_slave_1 left promiscuous mode [ 1378.441004][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1378.530986][ T21] Bluetooth: hci7: command 0x0419 tx timeout [ 1378.611586][T12783] device bridge_slave_0 left promiscuous mode [ 1378.617805][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:39:09 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1378.747318][T12783] device hsr_slave_0 left promiscuous mode [ 1378.775263][T12783] device hsr_slave_1 left promiscuous mode [ 1379.321060][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1379.513135][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1379.923822][T12783] device bridge_slave_1 left promiscuous mode [ 1379.930042][T12783] bridge0: port 2(bridge_slave_1) entered disabled state [ 1380.218513][T12783] device bridge_slave_0 left promiscuous mode [ 1380.227611][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:39:10 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1381.661006][T12783] device hsr_slave_0 left promiscuous mode [ 1381.756063][T12783] device hsr_slave_1 left promiscuous mode 15:39:12 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1381.803957][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1381.834907][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1382.033062][T12783] device bridge_slave_1 left promiscuous mode [ 1382.039642][T12783] bridge0: port 2(bridge_slave_1) entered disabled state 15:39:13 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1382.521900][T12783] device bridge_slave_0 left promiscuous mode [ 1382.528131][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:39:13 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1383.371785][T12783] device hsr_slave_0 left promiscuous mode 15:39:14 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1383.539380][T12783] device hsr_slave_1 left promiscuous mode [ 1383.808383][T12783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1383.823336][T12783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1383.842999][T12783] device bridge_slave_1 left promiscuous mode [ 1383.849199][T12783] bridge0: port 2(bridge_slave_1) entered disabled state 15:39:14 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1384.125980][T12783] device bridge_slave_0 left promiscuous mode [ 1384.141525][T12783] bridge0: port 1(bridge_slave_0) entered disabled state 15:39:15 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1385.791357][T12783] device veth1_macvtap left promiscuous mode [ 1385.797455][T12783] device veth0_macvtap left promiscuous mode [ 1385.821051][T12783] device veth1_vlan left promiscuous mode [ 1385.826876][T12783] device veth0_vlan left promiscuous mode 15:39:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1386.923532][T12783] device veth1_macvtap left promiscuous mode [ 1386.929607][T12783] device veth0_macvtap left promiscuous mode [ 1386.946129][T12783] device veth1_vlan left promiscuous mode [ 1386.958887][T12783] device veth0_vlan left promiscuous mode 15:39:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1388.226094][T12783] device veth1_macvtap left promiscuous mode [ 1388.241397][T12783] device veth0_macvtap left promiscuous mode [ 1388.247481][T12783] device veth1_vlan left promiscuous mode [ 1388.260864][T12783] device veth0_vlan left promiscuous mode 15:39:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1388.611831][T12783] device veth1_vlan left promiscuous mode [ 1388.617669][T12783] device veth0_vlan left promiscuous mode 15:39:19 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1388.845134][T12783] device veth1_macvtap left promiscuous mode [ 1388.853125][T12783] device veth0_macvtap left promiscuous mode [ 1388.859194][T12783] device veth1_vlan left promiscuous mode [ 1388.865853][T12783] device veth0_vlan left promiscuous mode [ 1388.882320][T12783] device veth0_vlan left promiscuous mode 15:39:20 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:21 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:22 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:22 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:23 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:24 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:24 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:25 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:26 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:27 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:28 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:29 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:32 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:33 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:34 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:34 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r2}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r1, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:34 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:35 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:36 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:37 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:38 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:42 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1413.330965][ T1932] Bluetooth: hci8: command 0x0409 tx timeout 15:39:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:45 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:45 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1415.410921][ T3561] Bluetooth: hci8: command 0x041b tx timeout 15:39:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:47 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:48 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1417.491062][ T1203] Bluetooth: hci8: command 0x040f tx timeout 15:39:48 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:49 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1419.570897][ T1208] Bluetooth: hci8: command 0x0419 tx timeout 15:39:50 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:50 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:51 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:52 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:53 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1422.932360][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1422.938754][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 15:39:54 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:55 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1425.010959][ T3561] Bluetooth: hci5: command 0x0406 tx timeout [ 1425.017018][ T3561] Bluetooth: hci4: command 0x0406 tx timeout 15:39:55 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:56 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:39:57 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r1}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a00)={r0}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000600)='./file0\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000ec0)={@map, r0, 0x5, 0x10, 0x0, @link_id=0xffffffffffffffff}, 0x20) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1427.112772][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1427.644826][T12783] team0 (unregistering): Port device team_slave_0 removed 15:39:58 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1428.113834][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:39:59 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1428.534294][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:00 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1430.130973][ T1208] Bluetooth: hci0: command 0x0406 tx timeout 15:40:00 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:01 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1431.101541][T12783] bond0 (unregistering): Released all slaves 15:40:01 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:02 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:02 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:04 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1434.770964][ T1203] Bluetooth: hci9: command 0x0409 tx timeout 15:40:05 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1435.090945][ T3561] Bluetooth: hci10: command 0x0409 tx timeout 15:40:06 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1436.211792][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1436.605631][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1436.796282][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1436.850943][ T3561] Bluetooth: hci9: command 0x041b tx timeout [ 1437.171151][ T3561] Bluetooth: hci10: command 0x041b tx timeout [ 1437.246822][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:07 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:08 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1438.303294][ T21] Bluetooth: hci11: command 0x0409 tx timeout 15:40:09 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1438.941258][T18672] Bluetooth: hci9: command 0x040f tx timeout [ 1439.053895][T12783] bond0 (unregistering): Released all slaves 15:40:09 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1439.261249][T18669] Bluetooth: hci10: command 0x040f tx timeout 15:40:10 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1440.371009][T18669] Bluetooth: hci11: command 0x041b tx timeout 15:40:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1441.020986][T18672] Bluetooth: hci9: command 0x0419 tx timeout [ 1441.330967][T18669] Bluetooth: hci10: command 0x0419 tx timeout [ 1441.902782][T12783] team0 (unregistering): Port device team_slave_1 removed 15:40:12 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1442.331673][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1442.461121][ T21] Bluetooth: hci11: command 0x040f tx timeout 15:40:13 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1442.598624][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1443.711216][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:14 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1444.531335][T18669] Bluetooth: hci11: command 0x0419 tx timeout 15:40:15 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:15 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1445.358338][T12783] bond0 (unregistering): Released all slaves 15:40:16 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:18 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:19 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:19 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:20 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:20 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1450.481805][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1450.521471][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1450.585970][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:40:21 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1451.088692][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:21 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:22 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:22 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:23 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1453.031685][T12783] bond0 (unregistering): Released all slaves 15:40:24 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:25 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r0, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r1, 0xd, 0x10, 0x0, @prog_fd=r0, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:25 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:26 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:26 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:27 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:27 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:28 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1458.456592][T12783] team0 (unregistering): Port device team_slave_1 removed 15:40:29 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:29 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1459.208097][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1459.261049][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1459.311177][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:30 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:31 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:31 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1461.875417][T12783] bond0 (unregistering): Released all slaves 15:40:32 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1462.404799][T12783] team0 (unregistering): Port device team_slave_1 removed 15:40:33 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1462.708462][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1463.314246][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:40:34 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1463.568985][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:35 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1464.577931][T12783] bond0 (unregistering): Released all slaves 15:40:36 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:37 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:39 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:39 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:40 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:40 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1470.192940][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1470.631522][T12783] team0 (unregistering): Port device team_slave_0 removed 15:40:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1470.921802][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1471.091198][ T3561] Bluetooth: hci1: command 0x0406 tx timeout 15:40:41 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1471.663786][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:42 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:44 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:44 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1475.021385][T12783] bond0 (unregistering): Released all slaves 15:40:45 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:48 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:49 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:49 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1479.340923][T18669] Bluetooth: hci12: command 0x0409 tx timeout [ 1479.819737][T12783] team0 (unregistering): Port device team_slave_1 removed 15:40:50 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:51 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1480.698525][T12783] team0 (unregistering): Port device team_slave_0 removed 15:40:51 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1481.410953][ T3561] Bluetooth: hci12: command 0x041b tx timeout [ 1481.471170][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:40:52 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1482.321359][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:40:52 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:52 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:53 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:53 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1483.490801][ T1208] Bluetooth: hci12: command 0x040f tx timeout 15:40:54 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:54 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:54 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1484.381582][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.387878][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 [ 1484.411420][T12783] bond0 (unregistering): Released all slaves 15:40:55 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1485.570858][ T1203] Bluetooth: hci12: command 0x0419 tx timeout 15:40:56 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:57 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:58 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:40:59 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1489.520931][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1489.557999][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1489.911264][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:41:00 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:01 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1490.932220][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1491.570949][T18672] Bluetooth: hci3: command 0x0406 tx timeout [ 1491.580825][T18672] Bluetooth: hci6: command 0x0406 tx timeout 15:41:02 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:02 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:03 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1493.317909][T12783] bond0 (unregistering): Released all slaves 15:41:04 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:04 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:05 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900), &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1495.575353][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1495.683511][T12783] team0 (unregistering): Port device team_slave_0 removed 15:41:06 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900), &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1495.831808][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1496.361247][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:41:07 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900), &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1496.701149][T18672] Bluetooth: hci7: command 0x0406 tx timeout [ 1497.146791][T12783] bond0 (unregistering): Released all slaves 15:41:08 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1498.062045][T12783] team0 (unregistering): Port device team_slave_1 removed 15:41:09 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1499.263993][T12783] team0 (unregistering): Port device team_slave_0 removed 15:41:10 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1500.181754][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:41:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1500.850924][T18671] Bluetooth: hci13: command 0x0409 tx timeout [ 1501.091043][ T1205] Bluetooth: hci14: command 0x0409 tx timeout 15:41:11 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:12 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1502.416929][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1502.930864][ T1208] Bluetooth: hci13: command 0x041b tx timeout 15:41:13 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1503.171127][ T1205] Bluetooth: hci14: command 0x041b tx timeout 15:41:14 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:14 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1504.370924][ T1203] Bluetooth: hci15: command 0x0409 tx timeout [ 1504.692194][T12783] bond0 (unregistering): Released all slaves [ 1505.010876][ T1208] Bluetooth: hci13: command 0x040f tx timeout 15:41:15 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:15 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1505.251083][ T3561] Bluetooth: hci14: command 0x040f tx timeout 15:41:16 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:16 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1506.450945][ T1205] Bluetooth: hci15: command 0x041b tx timeout 15:41:17 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1507.090885][ T1205] Bluetooth: hci13: command 0x0419 tx timeout [ 1507.331171][ T1205] Bluetooth: hci14: command 0x0419 tx timeout 15:41:18 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0xd, 0x10, 0x0, @prog_fd=r1, r2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:18 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0x0, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1508.531168][ T1205] Bluetooth: hci15: command 0x040f tx timeout 15:41:19 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0x0, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1509.832282][T12783] team0 (unregistering): Port device team_slave_1 removed 15:41:20 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0x0, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1510.611001][ T3561] Bluetooth: hci15: command 0x0419 tx timeout [ 1510.865905][T12783] team0 (unregistering): Port device team_slave_0 removed [ 1510.943250][T12783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1511.017484][T12783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:41:21 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x0, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:22 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x0, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:22 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x0, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:23 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:24 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1514.034307][T12783] bond0 (unregistering): Released all slaves 15:41:25 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:25 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:26 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:26 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0]}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:27 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:27 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") 15:41:28 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1517.651250][ T27] INFO: task kworker/0:2:1066 blocked for more than 143 seconds. [ 1517.659252][ T27] Not tainted 5.15.151-syzkaller #0 [ 1517.690791][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1517.699498][ T27] task:kworker/0:2 state:D stack:23200 pid: 1066 ppid: 2 flags:0x00004000 [ 1517.709330][ T27] Workqueue: events linkwatch_event [ 1517.716288][ T27] Call Trace: [ 1517.720153][ T27] [ 1517.723588][ T27] __schedule+0x12c4/0x45b0 [ 1517.728157][ T27] ? mark_lock+0x98/0x340 [ 1517.733356][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1517.739356][ T27] ? __sched_text_start+0x8/0x8 [ 1517.750892][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1517.756442][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1517.762054][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1517.767266][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1517.772946][ T27] schedule+0x11b/0x1f0 [ 1517.777120][ T27] schedule_preempt_disabled+0xf/0x20 [ 1517.790756][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1517.796047][ T27] ? linkwatch_event+0xa/0x50 [ 1517.801158][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1517.806368][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1517.812816][ T27] ? print_irqtrace_events+0x210/0x210 [ 1517.818284][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1517.824609][ T27] mutex_lock_nested+0x17/0x20 [ 1517.829393][ T27] linkwatch_event+0xa/0x50 [ 1517.840961][ T27] process_one_work+0x8a1/0x10c0 [ 1517.846004][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1517.852622][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1517.858182][ T27] ? kthread_data+0x4e/0xc0 [ 1517.870737][ T27] ? wq_worker_running+0x97/0x170 [ 1517.875832][ T27] worker_thread+0xaca/0x1280 [ 1517.880544][ T27] kthread+0x3f6/0x4f0 [ 1517.885133][ T27] ? rcu_lock_release+0x20/0x20 [ 1517.889991][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1517.900757][ T27] ret_from_fork+0x1f/0x30 [ 1517.905288][ T27] [ 1517.908369][ T27] INFO: task kworker/0:9:28931 blocked for more than 143 seconds. [ 1517.916687][ T27] Not tainted 5.15.151-syzkaller #0 [ 1517.930813][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1517.939524][ T27] task:kworker/0:9 state:D stack:25048 pid:28931 ppid: 2 flags:0x00004000 [ 1517.950754][ T27] Workqueue: ipv6_addrconf addrconf_dad_work [ 1517.956871][ T27] Call Trace: [ 1517.960153][ T27] [ 1517.981009][ T27] __schedule+0x12c4/0x45b0 [ 1517.985565][ T27] ? mark_lock+0x98/0x340 [ 1517.989914][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1518.000793][ T27] ? __sched_text_start+0x8/0x8 [ 1518.005722][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1518.011604][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1518.016815][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1518.027232][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1518.040756][ T27] schedule+0x11b/0x1f0 [ 1518.044950][ T27] schedule_preempt_disabled+0xf/0x20 [ 1518.050326][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1518.056098][ T27] ? addrconf_dad_work+0xcc/0x1720 [ 1518.063704][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1518.068937][ T27] mutex_lock_nested+0x17/0x20 [ 1518.079181][ T27] addrconf_dad_work+0xcc/0x1720 [ 1518.086722][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1518.095789][ T27] ? rcu_lock_release+0x20/0x20 [ 1518.100668][ T27] ? print_irqtrace_events+0x210/0x210 [ 1518.108769][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1518.119916][ T27] process_one_work+0x8a1/0x10c0 [ 1518.127444][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1518.137414][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1518.146807][ T27] ? kthread_data+0x4e/0xc0 [ 1518.153832][ T27] ? wq_worker_running+0x97/0x170 [ 1518.158884][ T27] worker_thread+0xaca/0x1280 [ 1518.168408][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1518.176980][ T27] kthread+0x3f6/0x4f0 [ 1518.184169][ T27] ? rcu_lock_release+0x20/0x20 [ 1518.189050][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1518.198465][ T27] ret_from_fork+0x1f/0x30 [ 1518.205492][ T27] [ 1518.208555][ T27] INFO: task kworker/0:13:1200 blocked for more than 143 seconds. [ 1518.221773][ T27] Not tainted 5.15.151-syzkaller #0 [ 1518.233113][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1518.246571][ T27] task:kworker/0:13 state:D stack:24984 pid: 1200 ppid: 2 flags:0x00004000 [ 1518.260583][ T27] Workqueue: events switchdev_deferred_process_work [ 1518.267422][ T27] Call Trace: [ 1518.272200][ T27] [ 1518.275149][ T27] __schedule+0x12c4/0x45b0 [ 1518.279674][ T27] ? mark_lock+0x98/0x340 [ 1518.291438][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1518.297499][ T27] ? __sched_text_start+0x8/0x8 [ 1518.310743][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1518.316262][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1518.321962][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1518.327174][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1518.332794][ T27] schedule+0x11b/0x1f0 [ 1518.341000][ T27] schedule_preempt_disabled+0xf/0x20 [ 1518.346398][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1518.360773][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1518.369620][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1518.375253][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1518.381639][ T27] ? print_irqtrace_events+0x210/0x210 [ 1518.387119][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1518.401308][ T27] mutex_lock_nested+0x17/0x20 [ 1518.406109][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1518.412441][ T27] process_one_work+0x8a1/0x10c0 [ 1518.417407][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1518.430731][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1518.437050][ T27] ? kthread_data+0x4e/0xc0 [ 1518.450903][ T27] ? wq_worker_running+0x97/0x170 [ 1518.455965][ T27] worker_thread+0xaca/0x1280 15:41:28 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1518.461128][ T27] kthread+0x3f6/0x4f0 [ 1518.465211][ T27] ? rcu_lock_release+0x20/0x20 [ 1518.470067][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1518.480750][ T27] ret_from_fork+0x1f/0x30 [ 1518.485257][ T27] [ 1518.492387][ T27] INFO: task kworker/0:16:1204 blocked for more than 144 seconds. [ 1518.500213][ T27] Not tainted 5.15.151-syzkaller #0 [ 1518.511321][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1518.520011][ T27] task:kworker/0:16 state:D stack:24632 pid: 1204 ppid: 2 flags:0x00004000 [ 1518.539159][ T27] Workqueue: events nsim_dev_trap_report_work [ 1518.550743][ T27] Call Trace: [ 1518.554080][ T27] [ 1518.557022][ T27] __schedule+0x12c4/0x45b0 [ 1518.590756][ T27] ? mark_lock+0x98/0x340 [ 1518.595188][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1518.601614][ T27] ? __sched_text_start+0x8/0x8 [ 1518.606485][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1518.612627][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1518.617841][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1518.630758][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1518.635989][ T27] schedule+0x11b/0x1f0 [ 1518.640151][ T27] schedule_preempt_disabled+0xf/0x20 [ 1518.650735][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1518.655983][ T27] ? nsim_dev_trap_report_work+0x56/0xab0 [ 1518.670866][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1518.676123][ T27] mutex_lock_nested+0x17/0x20 [ 1518.681391][ T27] nsim_dev_trap_report_work+0x56/0xab0 [ 1518.686965][ T27] ? print_irqtrace_events+0x210/0x210 [ 1518.695691][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1518.710751][ T27] process_one_work+0x8a1/0x10c0 [ 1518.718623][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1518.725232][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1518.731654][ T27] ? kthread_data+0x4e/0xc0 [ 1518.736172][ T27] ? wq_worker_running+0x97/0x170 [ 1518.741549][ T27] worker_thread+0xaca/0x1280 [ 1518.746657][ T27] kthread+0x3f6/0x4f0 [ 1518.754299][ T27] ? rcu_lock_release+0x20/0x20 [ 1518.759173][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1518.771344][ T27] ret_from_fork+0x1f/0x30 [ 1518.775799][ T27] [ 1518.778834][ T27] INFO: task syz-executor.0:2925 blocked for more than 144 seconds. [ 1518.790799][ T27] Not tainted 5.15.151-syzkaller #0 [ 1518.796526][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1518.810779][ T27] task:syz-executor.0 state:D stack:21624 pid: 2925 ppid: 1 flags:0x00004006 [ 1518.820009][ T27] Call Trace: [ 1518.830772][ T27] [ 1518.833729][ T27] __schedule+0x12c4/0x45b0 [ 1518.838276][ T27] ? __sched_text_start+0x8/0x8 [ 1518.870943][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1518.876454][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1518.890748][ T27] schedule+0x11b/0x1f0 [ 1518.894946][ T27] schedule_preempt_disabled+0xf/0x20 [ 1518.900327][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1518.920852][ T27] ? del_device_store+0xf1/0x470 [ 1518.925834][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1518.940787][ T27] ? skip_atoi+0xd0/0xd0 [ 1518.945110][ T27] mutex_lock_nested+0x17/0x20 [ 1518.950305][ T27] del_device_store+0xf1/0x470 [ 1518.980932][ T27] ? del_port_store+0x270/0x270 [ 1518.985827][ T27] ? sysfs_kf_write+0x181/0x2a0 [ 1519.000801][ T27] ? sysfs_kf_read+0x300/0x300 [ 1519.010790][ T27] kernfs_fop_write_iter+0x3a2/0x4f0 [ 1519.023966][ T27] vfs_write+0xacf/0xe50 [ 1519.028255][ T27] ? file_end_write+0x250/0x250 [ 1519.040808][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1519.060852][ T27] ? __fdget_pos+0x2d2/0x380 [ 1519.065511][ T27] ksys_write+0x1a2/0x2c0 [ 1519.069852][ T27] ? print_irqtrace_events+0x210/0x210 15:41:29 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1519.110747][ T27] ? __ia32_sys_read+0x80/0x80 [ 1519.115567][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1519.138184][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1519.150750][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1519.157186][ T27] do_syscall_64+0x3d/0xb0 [ 1519.170731][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1519.181301][ T27] RIP: 0033:0x7fc25fa67aef [ 1519.185741][ T27] RSP: 002b:00007ffcdac8ef30 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1519.210933][ T27] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fc25fa67aef [ 1519.218941][ T27] RDX: 0000000000000001 RSI: 00007ffcdac8ef80 RDI: 0000000000000005 [ 1519.227468][ T27] RBP: 00007fc25fab5021 R08: 0000000000000000 R09: 00007ffcdac8ed87 [ 1519.235810][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1519.244282][ T27] R13: 00007ffcdac8ef80 R14: 00007fc2606bf620 R15: 0000000000000003 [ 1519.253228][ T27] [ 1519.256696][ T27] INFO: task syz-executor.3:2929 blocked for more than 144 seconds. [ 1519.265469][ T27] Not tainted 5.15.151-syzkaller #0 [ 1519.280835][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1519.289519][ T27] task:syz-executor.3 state:D stack:21624 pid: 2929 ppid: 1 flags:0x00004006 [ 1519.300739][ T27] Call Trace: [ 1519.304034][ T27] [ 1519.306962][ T27] __schedule+0x12c4/0x45b0 [ 1519.320767][ T27] ? __sched_text_start+0x8/0x8 [ 1519.325643][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1519.331769][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1519.336989][ T27] schedule+0x11b/0x1f0 [ 1519.350746][ T27] schedule_preempt_disabled+0xf/0x20 [ 1519.356137][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1519.362736][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1519.367878][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1519.380836][ T27] mutex_lock_nested+0x17/0x20 [ 1519.385621][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1519.390559][ T27] ? reacquire_held_locks+0x660/0x660 [ 1519.400741][ T27] ? rtnetlink_bind+0x80/0x80 [ 1519.405493][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1519.410592][ T27] ? __kernel_text_address+0x94/0x100 [ 1519.420730][ T27] ? unwind_get_return_address+0x49/0x80 [ 1519.426464][ T27] ? reacquire_held_locks+0x660/0x660 [ 1519.440744][ T27] ? arch_stack_walk+0xf3/0x140 [ 1519.445693][ T27] ? mark_lock+0x98/0x340 [ 1519.450042][ T27] ? mark_lock+0x98/0x340 [ 1519.460883][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1519.465965][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1519.471430][ T27] ? rtnetlink_bind+0x80/0x80 [ 1519.476119][ T27] ? netlink_ack+0xb10/0xb10 [ 1519.490758][ T27] netlink_unicast+0x7b6/0x980 [ 1519.495605][ T27] ? netlink_detachskb+0x90/0x90 [ 1519.511396][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1519.516715][ T27] ? 0xffffffff81000000 [ 1519.530734][ T27] ? __check_object_size+0x300/0x410 [ 1519.536105][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1519.560810][ T27] netlink_sendmsg+0xa30/0xd60 [ 1519.571031][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1519.576267][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1519.606888][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1519.612698][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1519.618200][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1519.623828][ T27] __sys_sendto+0x564/0x720 [ 1519.628426][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1519.640863][ T27] ? print_irqtrace_events+0x210/0x210 [ 1519.646361][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1519.651815][ T27] __x64_sys_sendto+0xda/0xf0 [ 1519.656522][ T27] do_syscall_64+0x3d/0xb0 [ 1519.670735][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1519.676667][ T27] RIP: 0033:0x7f34a85cca9c [ 1519.681563][ T27] RSP: 002b:00007ffdd4135460 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1519.690002][ T27] RAX: ffffffffffffffda RBX: 00007f34a92205c0 RCX: 00007f34a85cca9c [ 1519.710835][ T27] RDX: 0000000000000030 RSI: 00007f34a9220610 RDI: 0000000000000006 [ 1519.718851][ T27] RBP: 0000000000000000 R08: 00007ffdd41354b4 R09: 000000000000000c [ 1519.727278][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 1519.740728][ T27] R13: 0000000000000000 R14: 00007f34a9220610 R15: 0000000000000000 [ 1519.748744][ T27] [ 1519.760801][ T27] INFO: task syz-executor.4:2974 blocked for more than 145 seconds. [ 1519.769251][ T27] Not tainted 5.15.151-syzkaller #0 [ 1519.780734][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1519.789424][ T27] task:syz-executor.4 state:D stack:21624 pid: 2974 ppid: 1 flags:0x00004006 [ 1519.811075][ T27] Call Trace: [ 1519.814512][ T27] [ 1519.817478][ T27] __schedule+0x12c4/0x45b0 [ 1519.822463][ T27] ? __sched_text_start+0x8/0x8 [ 1519.827323][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1519.840022][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1519.847745][ T27] schedule+0x11b/0x1f0 [ 1519.853420][ T27] schedule_preempt_disabled+0xf/0x20 [ 1519.858805][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1519.868813][ T27] ? netdev_run_todo+0xa4f/0xc40 [ 1519.876985][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1519.890736][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1519.896670][ T27] ? _raw_spin_unlock+0x40/0x40 [ 1519.910741][ T27] mutex_lock_nested+0x17/0x20 [ 1519.915538][ T27] netdev_run_todo+0xa4f/0xc40 [ 1519.924076][ T27] ? netdev_refcnt_read+0x50/0x50 [ 1519.929198][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1519.940726][ T27] ? bpf_offload_dev_netdev_register+0xc40/0xc40 [ 1519.947145][ T27] ? _raw_spin_unlock+0x24/0x40 [ 1519.960901][ T27] ? simple_release_fs+0x98/0xd0 [ 1519.965867][ T27] nsim_destroy+0xac/0x140 [ 1519.970288][ T27] __nsim_dev_port_del+0x153/0x1b0 [ 1519.980729][ T27] nsim_dev_reload_destroy+0x15e/0x240 [ 1519.986309][ T27] nsim_dev_remove+0x59/0x100 [ 1520.000736][ T27] ? nsim_bus_probe+0x20/0x20 [ 1520.005443][ T27] device_release_driver_internal+0x4cb/0x7f0 [ 1520.020741][ T27] bus_remove_device+0x2e5/0x400 [ 1520.025723][ T27] device_del+0x6e2/0xbd0 [ 1520.030055][ T27] ? del_device_store+0xf1/0x470 [ 1520.050969][ T27] ? kill_device+0x160/0x160 [ 1520.055604][ T27] device_unregister+0x1c/0xc0 [ 1520.060374][ T27] del_device_store+0x321/0x470 [ 1520.070736][ T27] ? del_port_store+0x270/0x270 [ 1520.076024][ T27] ? sysfs_kf_write+0x181/0x2a0 [ 1520.090741][ T27] ? sysfs_kf_read+0x300/0x300 [ 1520.095536][ T27] kernfs_fop_write_iter+0x3a2/0x4f0 [ 1520.101257][ T27] vfs_write+0xacf/0xe50 [ 1520.105518][ T27] ? file_end_write+0x250/0x250 [ 1520.110373][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1520.138511][ T27] ? __fdget_pos+0x2d2/0x380 [ 1520.143645][ T27] ksys_write+0x1a2/0x2c0 [ 1520.147988][ T27] ? print_irqtrace_events+0x210/0x210 [ 1520.160743][ T27] ? __ia32_sys_read+0x80/0x80 [ 1520.165544][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1520.176129][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1520.182065][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1520.188069][ T27] do_syscall_64+0x3d/0xb0 [ 1520.200730][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1520.206660][ T27] RIP: 0033:0x7f52842afaef [ 1520.220730][ T27] RSP: 002b:00007ffefef3cb40 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1520.229183][ T27] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f52842afaef [ 1520.249690][ T27] RDX: 0000000000000001 RSI: 00007ffefef3cb90 RDI: 0000000000000005 [ 1520.258247][ T27] RBP: 00007f52842fd021 R08: 0000000000000000 R09: 00007ffefef3c997 [ 1520.270725][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1520.278721][ T27] R13: 00007ffefef3cb90 R14: 00007f5284f07620 R15: 0000000000000003 [ 1520.300755][ T27] [ 1520.303885][ T27] INFO: task syz-executor.1:3619 blocked for more than 146 seconds. [ 1520.312602][ T27] Not tainted 5.15.151-syzkaller #0 [ 1520.318324][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1520.340815][ T27] task:syz-executor.1 state:D stack:21624 pid: 3619 ppid: 1 flags:0x00004006 [ 1520.350058][ T27] Call Trace: [ 1520.353722][ T27] [ 1520.356680][ T27] __schedule+0x12c4/0x45b0 [ 1520.370759][ T27] ? __sched_text_start+0x8/0x8 [ 1520.375642][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1520.390744][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1520.395980][ T27] schedule+0x11b/0x1f0 [ 1520.400146][ T27] schedule_preempt_disabled+0xf/0x20 [ 1520.410745][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1520.415980][ T27] ? rtnl_newlink+0xae9/0x2070 [ 1520.430745][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1520.435986][ T27] ? nla_strscpy+0xf9/0x170 [ 1520.440510][ T27] ? memset+0x1f/0x40 [ 1520.445006][ T27] mutex_lock_nested+0x17/0x20 [ 1520.449785][ T27] rtnl_newlink+0xae9/0x2070 [ 1520.460738][ T27] ? rtnl_newlink+0x531/0x2070 [ 1520.465535][ T27] ? rtnl_newlink+0x531/0x2070 [ 1520.470316][ T27] ? rtnl_setlink+0x540/0x540 [ 1520.490870][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1520.496050][ T27] ? rtnl_setlink+0x540/0x540 [ 1520.501401][ T27] rtnetlink_rcv_msg+0x993/0xee0 [ 1520.506365][ T27] ? reacquire_held_locks+0x660/0x660 [ 1520.520741][ T27] ? rtnetlink_bind+0x80/0x80 [ 1520.525465][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1520.530501][ T27] ? __kernel_text_address+0x94/0x100 [ 1520.540745][ T27] ? unwind_get_return_address+0x49/0x80 [ 1520.546410][ T27] ? reacquire_held_locks+0x660/0x660 [ 1520.560735][ T27] ? arch_stack_walk+0xf3/0x140 [ 1520.565624][ T27] ? mark_lock+0x98/0x340 [ 1520.569969][ T27] ? mark_lock+0x98/0x340 [ 1520.580735][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1520.585816][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1520.600742][ T27] ? rtnetlink_bind+0x80/0x80 [ 1520.605468][ T27] ? netlink_ack+0xb10/0xb10 [ 1520.610092][ T27] netlink_unicast+0x7b6/0x980 [ 1520.620740][ T27] ? netlink_detachskb+0x90/0x90 [ 1520.625710][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1520.640731][ T27] ? 0xffffffff81000000 [ 1520.644919][ T27] ? __check_object_size+0x300/0x410 [ 1520.650211][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1520.660734][ T27] netlink_sendmsg+0xa30/0xd60 [ 1520.665541][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1520.680734][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1520.685713][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1520.692090][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1520.697575][ T27] ? netlink_getsockopt+0x5b0/0x5b0 15:41:31 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1520.710748][ T27] __sys_sendto+0x564/0x720 [ 1520.715451][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1520.744841][ T27] ? rcu_is_watching+0x11/0xa0 [ 1520.749728][ T27] ? print_irqtrace_events+0x210/0x210 [ 1520.755648][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1520.760616][ T27] __x64_sys_sendto+0xda/0xf0 [ 1520.770755][ T27] do_syscall_64+0x3d/0xb0 [ 1520.775200][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1520.790747][ T27] RIP: 0033:0x7f68388cfa9c [ 1520.795646][ T27] RSP: 002b:00007fff83abe0e0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1520.804504][ T27] RAX: ffffffffffffffda RBX: 00007f6839524620 RCX: 00007f68388cfa9c [ 1520.812948][ T27] RDX: 000000000000003c RSI: 00007f6839524670 RDI: 0000000000000003 [ 1520.830809][ T27] RBP: 0000000000000000 R08: 00007fff83abe134 R09: 000000000000000c [ 1520.838803][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1520.847233][ T27] R13: 0000000000000000 R14: 00007f6839524670 R15: 0000000000000000 [ 1520.855634][ T27] [ 1520.858751][ T27] INFO: task syz-executor.0:3757 blocked for more than 146 seconds. [ 1520.867381][ T27] Not tainted 5.15.151-syzkaller #0 [ 1520.880734][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1520.889422][ T27] task:syz-executor.0 state:D stack:27064 pid: 3757 ppid: 1 flags:0x00004006 [ 1520.910799][ T27] Call Trace: [ 1520.914107][ T27] [ 1520.917040][ T27] __schedule+0x12c4/0x45b0 [ 1520.930763][ T27] ? __sched_text_start+0x8/0x8 [ 1520.935705][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1520.941737][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1520.947061][ T27] schedule+0x11b/0x1f0 [ 1520.980758][ T27] schedule_preempt_disabled+0xf/0x20 [ 1520.986314][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1521.010886][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1521.016161][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1521.030998][ T27] mutex_lock_nested+0x17/0x20 [ 1521.035914][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1521.070741][ T27] ? reacquire_held_locks+0x660/0x660 [ 1521.076165][ T27] ? rtnetlink_bind+0x80/0x80 [ 1521.090729][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1521.095790][ T27] ? __kernel_text_address+0x94/0x100 [ 1521.120861][ T27] ? unwind_get_return_address+0x49/0x80 [ 1521.126749][ T27] ? reacquire_held_locks+0x660/0x660 [ 1521.140928][ T27] ? arch_stack_walk+0xf3/0x140 [ 1521.145816][ T27] ? mark_lock+0x98/0x340 [ 1521.150165][ T27] ? mark_lock+0x98/0x340 [ 1521.180735][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1521.186057][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1521.210832][ T27] ? rtnetlink_bind+0x80/0x80 [ 1521.215806][ T27] ? netlink_ack+0xb10/0xb10 [ 1521.220520][ T27] netlink_unicast+0x7b6/0x980 [ 1521.240739][ T27] ? netlink_detachskb+0x90/0x90 [ 1521.245862][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1521.270954][ T27] ? 0xffffffff81000000 [ 1521.275281][ T27] ? __check_object_size+0x300/0x410 [ 1521.290801][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1521.296030][ T27] netlink_sendmsg+0xa30/0xd60 [ 1521.310743][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1521.316113][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1521.326393][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1521.332502][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1521.337993][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1521.343732][ T27] __sys_sendto+0x564/0x720 [ 1521.348536][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1521.371071][ T27] ? print_irqtrace_events+0x210/0x210 [ 1521.376574][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1521.381957][ T27] __x64_sys_sendto+0xda/0xf0 [ 1521.386645][ T27] do_syscall_64+0x3d/0xb0 [ 1521.395933][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1521.406437][ T27] RIP: 0033:0x7f0f5518ea9c [ 1521.414955][ T27] RSP: 002b:00007fff67bfd5e0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1521.430508][ T27] RAX: ffffffffffffffda RBX: 00007f0f55de3620 RCX: 00007f0f5518ea9c [ 1521.445789][ T27] RDX: 0000000000000028 RSI: 00007f0f55de3670 RDI: 0000000000000003 [ 1521.461073][ T27] RBP: 0000000000000000 R08: 00007fff67bfd634 R09: 000000000000000c [ 1521.469241][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1521.491605][ T27] R13: 0000000000000000 R14: 00007f0f55de3670 R15: 0000000000000000 [ 1521.499702][ T27] [ 1521.523173][ T27] INFO: task syz-executor.3:3760 blocked for more than 147 seconds. [ 1521.550346][ T27] Not tainted 5.15.151-syzkaller #0 [ 1521.574304][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1521.600955][ T27] task:syz-executor.3 state:D stack:26688 pid: 3760 ppid: 1 flags:0x00004006 [ 1521.620863][ T27] Call Trace: [ 1521.624336][ T27] [ 1521.627334][ T27] __schedule+0x12c4/0x45b0 [ 1521.653300][ T27] ? __sched_text_start+0x8/0x8 [ 1521.658190][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1521.680868][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1521.686230][ T27] schedule+0x11b/0x1f0 [ 1521.690414][ T27] schedule_preempt_disabled+0xf/0x20 [ 1521.713225][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1521.718604][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1521.742120][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1521.747668][ T27] mutex_lock_nested+0x17/0x20 [ 1521.761884][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1521.767081][ T27] ? reacquire_held_locks+0x660/0x660 [ 1521.781868][ T27] ? rtnetlink_bind+0x80/0x80 [ 1521.786581][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1521.801872][ T27] ? __kernel_text_address+0x94/0x100 [ 1521.807342][ T27] ? unwind_get_return_address+0x49/0x80 [ 1521.833280][ T27] ? reacquire_held_locks+0x660/0x660 [ 1521.838907][ T27] ? arch_stack_walk+0xf3/0x140 [ 1521.861985][ T27] ? mark_lock+0x98/0x340 [ 1521.866541][ T27] ? mark_lock+0x98/0x340 [ 1521.872677][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1521.877905][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1521.900956][ T27] ? rtnetlink_bind+0x80/0x80 [ 1521.905675][ T27] ? netlink_ack+0xb10/0xb10 [ 1521.910550][ T27] netlink_unicast+0x7b6/0x980 [ 1521.933138][ T27] ? netlink_detachskb+0x90/0x90 [ 1521.938125][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1521.962025][ T27] ? 0xffffffff81000000 [ 1521.966247][ T27] ? __check_object_size+0x300/0x410 [ 1521.990865][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1521.996023][ T27] netlink_sendmsg+0xa30/0xd60 [ 1522.003736][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1522.009055][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1522.030793][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1522.036197][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1522.051020][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1522.056348][ T27] __sys_sendto+0x564/0x720 15:41:32 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1522.080741][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1522.086320][ T27] ? print_irqtrace_events+0x210/0x210 [ 1522.110863][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1522.116066][ T27] __x64_sys_sendto+0xda/0xf0 [ 1522.130731][ T27] do_syscall_64+0x3d/0xb0 [ 1522.135463][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1522.150730][ T27] RIP: 0033:0x7ff709308a9c [ 1522.155256][ T27] RSP: 002b:00007ffe0a1f9de0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1522.175931][ T27] RAX: ffffffffffffffda RBX: 00007ff709f5d620 RCX: 00007ff709308a9c [ 1522.200909][ T27] RDX: 0000000000000028 RSI: 00007ff709f5d670 RDI: 0000000000000003 [ 1522.209140][ T27] RBP: 0000000000000000 R08: 00007ffe0a1f9e34 R09: 000000000000000c [ 1522.240795][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1522.249608][ T27] R13: 0000000000000000 R14: 00007ff709f5d670 R15: 0000000000000000 [ 1522.275247][ T27] [ 1522.278369][ T27] [ 1522.278369][ T27] Showing all locks held in the system: [ 1522.300992][ T27] 3 locks held by kworker/1:0/21: [ 1522.306048][ T27] #0: ffff88814a9ed138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1522.334755][ T27] #1: ffffc90000db7d20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1522.345580][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1522.355360][ T27] 1 lock held by khungtaskd/27: [ 1522.360209][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1522.381688][ T27] 6 locks held by kworker/u4:3/886: [ 1522.386911][ T27] #0: ffff888014fec938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1522.400724][ T27] #1: ffffc90004287d20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1522.420728][ T27] #2: ffff8880251f20e0 (&type->s_umount_key#32){++++}-{3:3}, at: trylock_super+0x1b/0xf0 [ 1522.440738][ T27] #3: ffff8880251f4bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1522.451809][ T27] #4: ffff8880251f6990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12b9/0x1570 [ 1522.470730][ T27] #5: ffff8880337f5238 (&ei->i_data_sem){++++}-{3:3}, at: ext4_writepages+0x2a15/0x3d10 [ 1522.480601][ T27] 3 locks held by kworker/0:2/1066: [ 1522.490728][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1522.510752][ T27] #1: ffffc90005287d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1522.521527][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1522.530530][ T27] 3 locks held by kworker/u4:4/1470: [ 1522.540747][ T27] 2 locks held by getty/3258: [ 1522.545442][ T27] #0: ffff88814ad8f098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1522.581488][ T27] #1: ffffc9000250b2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1522.591932][ T27] 6 locks held by kworker/u4:6/12783: [ 1522.597320][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1522.627128][ T27] #1: ffffc9000f5f7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1522.641198][ T27] #2: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1522.651132][ T27] #3: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1522.670872][ T27] #4: ffff88807b2a4d00 (team->team_lock_key#33){+.+.}-{3:3}, at: team_del_slave+0x2e/0x1f0 [ 1522.690829][ T27] #5: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 [ 1522.710749][ T27] 3 locks held by kworker/0:9/28931: [ 1522.716266][ T27] #0: ffff88814a9ed138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1522.759575][ T27] #1: ffffc90004e07d20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1522.780739][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xcc/0x1720 [ 1522.799697][ T27] 3 locks held by kworker/0:13/1200: [ 1522.811882][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1522.830733][ T27] #1: ffffc900031e7d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1522.861331][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1522.872245][ T27] 3 locks held by kworker/0:16/1204: [ 1522.877547][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1522.910817][ T27] #1: ffffc900031c7d20 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1522.960878][ T27] #2: ffff888061c16400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x56/0xab0 [ 1523.000895][ T27] 2 locks held by kworker/0:17/1205: [ 1523.006209][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1523.060727][ T27] #1: ffffc90003277d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1523.107843][ T27] 3 locks held by kworker/0:18/1208: [ 1523.120100][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1523.140817][ T27] #1: ffffc900032a7d20 (free_ipc_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1523.160779][ T27] #2: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1523.190809][ T27] 4 locks held by syz-executor.0/2925: [ 1523.196413][ T27] #0: ffff88802533c460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1523.220728][ T27] #1: ffff88802017c488 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1523.240723][ T27] #2: ffff88801e5ad830 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1523.280758][ T27] #3: ffffffff8d357ac8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1523.310944][ T27] 1 lock held by syz-executor.3/2929: [ 1523.316409][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.326771][ T27] 7 locks held by syz-executor.4/2974: [ 1523.332968][ T27] #0: ffff88802533c460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1523.342001][ T27] #1: ffff888061fff088 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1523.352325][ T27] #2: ffff88801e5ad830 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1523.362554][ T27] #3: ffffffff8d357ac8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1523.372913][ T27] #4: ffff888061c15178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0 [ 1523.383622][ T27] #5: ffff888061c16400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_reload_destroy+0x118/0x240 [ 1523.443556][ T27] #6: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40 [ 1523.480778][ T27] 1 lock held by syz-executor.1/3619: [ 1523.486321][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_newlink+0xae9/0x2070 [ 1523.510792][ T27] 1 lock held by syz-executor.0/3757: [ 1523.516293][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.540723][ T27] 1 lock held by syz-executor.3/3760: [ 1523.546125][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.570734][ T27] 1 lock held by syz-executor.4/3816: [ 1523.576217][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.610911][ T27] 1 lock held by syz-executor.1/4212: [ 1523.616516][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.640798][ T27] 1 lock held by syz-executor.0/4329: [ 1523.646399][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.700780][ T27] 1 lock held by syz-executor.3/4332: [ 1523.706430][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.730769][ T27] 1 lock held by syz-executor.4/4345: [ 1523.736269][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 15:41:34 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d00)={@cgroup=r1, 0x6, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], &(0x7f0000000cc0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={@map, r2, 0xd, 0x10, 0x0, @prog_fd=r1, r3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xe3b5, 0x8}, 0xc) syz_clone(0x8000000, &(0x7f0000000100)="f920f2108afc7918c9e4c4c3a30bb08845ab23470d333e32aa7e4445dc0fa82c12be71cbdae72ebfdac0d04b24ec331007062d1473905d6f24a0f2a6d711ecbda5833f8993db9d9b7ec356adf3a83c4ae9d7294dcd9c6e479d9d5ac0e4731ed4c3aa048a8b83c07ec407868275eba2b7ec929d8b69d77c510f24cf9a0ce855fd02b1be015e7bfb5881f6df8f1222355144410a0573aab3209c7a5ebd20064ae4a77578478b29c807fc671255bbe37ad5b35ea078efdee12d7f34991e0ac721776b", 0xc1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="d29637c4ada880a4d916f90a65fdefe1021c1703c8203d91ba8430fc0c77fd986c489addb729b45b5ee88b542dc129be428a13e519f7") [ 1523.759417][ T27] 1 lock held by syz-executor.1/4796: [ 1523.779759][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.820775][ T27] 3 locks held by syz-executor.2/4890: [ 1523.826265][ T27] 1 lock held by syz-executor.0/4899: [ 1523.850740][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.860193][ T27] 1 lock held by syz-executor.3/4902: [ 1523.890891][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.900424][ T27] 2 locks held by syz-executor.2/4907: [ 1523.912793][ T27] 2 locks held by syz-executor.2/4914: [ 1523.920994][ T27] 1 lock held by syz-executor.4/4920: [ 1523.926378][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1523.950752][ T27] 3 locks held by syz-executor.2/4924: [ 1523.956231][ T27] 2 locks held by syz-executor.2/4930: [ 1523.962115][ T27] 1 lock held by syz-executor.2/4942: [ 1523.968239][ T27] 2 locks held by syz-executor.2/4949: [ 1523.974561][ T27] 4 locks held by syz-executor.2/4952: [ 1523.980019][ T27] 2 locks held by syz-executor.2/4955: [ 1523.985974][ T27] 2 locks held by syz-executor.2/4962: [ 1523.991720][ T27] 2 locks held by syz-executor.2/4965: [ 1523.997173][ T27] 2 locks held by syz-executor.2/4968: [ 1524.010740][ T27] 4 locks held by syz-executor.2/4972: [ 1524.016253][ T27] 2 locks held by syz-executor.2/4975: [ 1524.022781][ T27] 3 locks held by syz-executor.2/4978: [ 1524.028241][ T27] 3 locks held by syz-executor.2/4982: [ 1524.034089][ T27] 2 locks held by syz-executor.2/4986: [ 1524.039546][ T27] 3 locks held by syz-executor.2/4989: [ 1524.045400][ T27] 2 locks held by syz-executor.2/4999: [ 1524.054476][ T27] 2 locks held by syz-executor.2/5002: [ 1524.059941][ T27] 3 locks held by syz-executor.2/5005: [ 1524.068754][ T27] 2 locks held by syz-executor.2/5008: [ 1524.080737][ T27] 2 locks held by syz-executor.2/5012: [ 1524.086256][ T27] 2 locks held by syz-executor.2/5016: [ 1524.094332][T12783] team0 (unregistering): Port device team_slave_1 removed [ 1524.102481][ T27] [ 1524.104814][ T27] ============================================= [ 1524.104814][ T27] [ 1524.114745][ T27] NMI backtrace for cpu 0 [ 1524.119074][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1524.127050][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1524.137107][ T27] Call Trace: [ 1524.140393][ T27] [ 1524.143316][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1524.148000][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1524.153643][ T27] ? panic+0x84d/0x84d [ 1524.157721][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1524.162844][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1524.167783][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1524.172667][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1524.178820][ T27] ? _printk+0xd1/0x111 [ 1524.182977][ T27] ? panic+0x84d/0x84d [ 1524.187047][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1524.191897][ T27] ? panic+0x84d/0x84d [ 1524.195966][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1524.200996][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1524.207119][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1524.213108][ T27] watchdog+0xe72/0xeb0 [ 1524.217351][ T27] kthread+0x3f6/0x4f0 [ 1524.221412][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1524.226438][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1524.231028][ T27] ret_from_fork+0x1f/0x30 [ 1524.235456][ T27] [ 1524.239099][ T27] Sending NMI from CPU 0 to CPUs 1: [ 1524.244446][ C1] NMI backtrace for cpu 1 [ 1524.244456][ C1] CPU: 1 PID: 3645 Comm: kworker/u4:5 Not tainted 5.15.151-syzkaller #0 [ 1524.244472][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1524.244480][ C1] Workqueue: bat_events batadv_nc_worker [ 1524.244565][ C1] RIP: 0010:__local_bh_disable_ip+0x19e/0x210 [ 1524.244604][ C1] Code: 00 85 c0 74 0a 45 31 f6 31 ff e8 7d 76 16 00 65 48 8b 1d 85 12 b5 7e 48 81 c3 e8 14 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 <74> 08 48 89 df e8 28 95 7c 00 4c 89 33 48 c7 44 24 20 0e 36 e0 45 [ 1524.244616][ C1] RSP: 0018:ffffc90003257a60 EFLAGS: 00000246 [ 1524.244627][ C1] RAX: 1ffff1100f72a655 RBX: ffff88807b9532a8 RCX: ffffffff8a253200 [ 1524.244639][ C1] RDX: 1ffff1100b4861a9 RSI: 0000000000000201 RDI: 0000000000000000 [ 1524.244648][ C1] RBP: ffffc90003257b38 R08: dffffc0000000000 R09: fffffbfff1f79e35 [ 1524.244659][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1524.244668][ C1] R13: 1ffff9200064af50 R14: 0000000000000000 R15: 0000000000000201 [ 1524.244678][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1524.244695][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1524.244705][ C1] CR2: 000000001ffffe00 CR3: 000000003e3b9000 CR4: 00000000003506e0 [ 1524.244717][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1524.244725][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1524.244734][ C1] Call Trace: [ 1524.244739][ C1] [ 1524.244744][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1524.244762][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1524.244777][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1524.244792][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 1524.244812][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1524.244826][ C1] ? nmi_handle+0xf7/0x370 [ 1524.244840][ C1] ? __local_bh_disable_ip+0x19e/0x210 [ 1524.244853][ C1] ? default_do_nmi+0x62/0x150 [ 1524.244866][ C1] ? exc_nmi+0xab/0x120 [ 1524.244878][ C1] ? end_repeat_nmi+0x16/0x31 [ 1524.244897][ C1] ? _raw_spin_lock_irqsave_nested+0xb0/0x130 [ 1524.244911][ C1] ? __local_bh_disable_ip+0x19e/0x210 [ 1524.244925][ C1] ? __local_bh_disable_ip+0x19e/0x210 [ 1524.244938][ C1] ? __local_bh_disable_ip+0x19e/0x210 [ 1524.244951][ C1] [ 1524.244955][ C1] [ 1524.244959][ C1] ? __local_bh_enable_ip+0x164/0x1f0 [ 1524.244971][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1524.244983][ C1] ? batadv_nc_purge_paths+0xe8/0x3b0 [ 1524.244996][ C1] ? __bpf_trace_softirq+0x10/0x10 [ 1524.245008][ C1] ? __local_bh_enable_ip+0x164/0x1f0 [ 1524.245020][ C1] ? batadv_nc_purge_paths+0x30e/0x3b0 [ 1524.245033][ C1] ? _local_bh_enable+0xa0/0xa0 [ 1524.245046][ C1] ? batadv_nc_purge_paths+0xe8/0x3b0 [ 1524.245058][ C1] ? batadv_nc_purge_paths+0xe8/0x3b0 [ 1524.245071][ C1] _raw_spin_lock_bh+0x18/0x40 [ 1524.245084][ C1] ? batadv_nc_purge_paths+0x3b0/0x3b0 [ 1524.245096][ C1] batadv_nc_purge_paths+0xe8/0x3b0 [ 1524.245114][ C1] batadv_nc_worker+0x2cf/0x5b0 [ 1524.245130][ C1] process_one_work+0x8a1/0x10c0 [ 1524.245151][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1524.245166][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1524.245179][ C1] ? kthread_data+0x4e/0xc0 [ 1524.245193][ C1] ? wq_worker_running+0x97/0x170 [ 1524.245207][ C1] worker_thread+0xaca/0x1280 [ 1524.245221][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1524.245243][ C1] kthread+0x3f6/0x4f0 [ 1524.245255][ C1] ? rcu_lock_release+0x20/0x20 [ 1524.245268][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1524.245281][ C1] ret_from_fork+0x1f/0x30 [ 1524.245300][ C1] [ 1524.434282][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1524.434299][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1524.434317][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1524.434327][ T27] Call Trace: [ 1524.434333][ T27] [ 1524.434341][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1524.434368][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1524.434389][ T27] ? panic+0x84d/0x84d [ 1524.434415][ T27] panic+0x318/0x84d [ 1524.434432][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1524.434453][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1524.434477][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1524.434496][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1524.434517][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1524.434537][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1524.434559][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1524.434581][ T27] watchdog+0xeb0/0xeb0 [ 1524.434610][ T27] kthread+0x3f6/0x4f0 [ 1524.434627][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1524.434645][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1524.434662][ T27] ret_from_fork+0x1f/0x30 [ 1524.434692][ T27] [ 1524.434961][ T27] Kernel Offset: disabled [ 1524.759876][ T27] Rebooting in 86400 seconds..