0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:15:54 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") [ 877.956961][ T8529] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:15:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x0, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 878.317785][T21092] team0: Port device team_slave_0 added [ 878.412609][T21092] team0: Port device team_slave_1 added [ 878.483684][ T8529] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 878.819710][T21456] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:15:55 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") 09:15:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x0, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 879.890486][T21456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 879.900674][T21092] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 879.915860][T21092] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 879.973507][T21092] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 09:15:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x0, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:15:57 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") 09:15:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x0, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:15:57 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") 09:15:58 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") 09:15:58 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x0, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 882.467121][T21092] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 882.488217][T21092] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 882.541647][T21092] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 882.587150][T21456] team0: Port device team_slave_0 added 09:15:59 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") 09:15:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 883.525658][T21456] team0: Port device team_slave_1 added [ 883.986850][T21092] device hsr_slave_0 entered promiscuous mode 09:16:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:00 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") [ 884.740350][T21092] device hsr_slave_1 entered promiscuous mode [ 885.055117][T21092] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 885.062726][T21092] Cannot create hsr debugfs directory 09:16:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") 09:16:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 886.588033][T21646] chnl_net:caif_netlink_parms(): no params data found 09:16:03 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") [ 887.126811][T21456] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 887.134462][T21456] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 887.197418][T21456] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 887.225521][T21456] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 887.232494][T21456] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 887.288562][T21456] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 09:16:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:04 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") 09:16:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 889.134367][ T8529] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:16:06 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") 09:16:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:07 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") [ 891.434037][ T8529] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:16:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") 09:16:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:10 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") [ 893.678524][T21456] device hsr_slave_0 entered promiscuous mode 09:16:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 894.227933][T21456] device hsr_slave_1 entered promiscuous mode [ 894.733556][T21456] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 894.759578][T21456] Cannot create hsr debugfs directory 09:16:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") 09:16:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 896.004746][ T8529] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:16:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:13 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 897.893010][T21646] bridge0: port 1(bridge_slave_0) entered blocking state [ 897.917427][T21646] bridge0: port 1(bridge_slave_0) entered disabled state [ 897.949339][T21646] device bridge_slave_0 entered promiscuous mode 09:16:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:17 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 902.034175][ T8529] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 902.398813][T21646] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.406083][T21646] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.429812][T21646] device bridge_slave_1 entered promiscuous mode [ 902.553788][ T2180] Bluetooth: hci0: command 0x0409 tx timeout [ 902.713589][ T2180] Bluetooth: hci3: command 0x0406 tx timeout 09:16:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:20 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 903.848111][T21646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 903.878464][T21646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 904.059179][T21646] team0: Port device team_slave_0 added [ 904.643848][ T2791] Bluetooth: hci0: command 0x041b tx timeout 09:16:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:22 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 906.123064][T21646] team0: Port device team_slave_1 added [ 906.723910][ T2180] Bluetooth: hci0: command 0x040f tx timeout 09:16:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 908.424693][T21646] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 908.437094][T21646] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 908.521397][T21646] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 908.555565][T21646] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 908.562531][T21646] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 908.660609][T21646] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 908.803959][ T1066] Bluetooth: hci0: command 0x0419 tx timeout 09:16:25 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 909.604998][T22044] syz-executor.3 (22044) used greatest stack depth: 18232 bytes left [ 909.684027][ T2180] Bluetooth: hci1: command 0x0409 tx timeout 09:16:26 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 910.631935][T21646] device hsr_slave_0 entered promiscuous mode [ 910.796532][T21646] device hsr_slave_1 entered promiscuous mode [ 910.944930][T21646] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 910.952669][T21646] Cannot create hsr debugfs directory 09:16:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 911.763602][ T1066] Bluetooth: hci1: command 0x041b tx timeout 09:16:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:28 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:30 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 913.833669][ T2180] Bluetooth: hci1: command 0x040f tx timeout [ 913.868998][T22277] chnl_net:caif_netlink_parms(): no params data found 09:16:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 914.614114][T22035] syz-executor.2 (22035) used greatest stack depth: 17720 bytes left [ 914.861307][T22277] bridge0: port 1(bridge_slave_0) entered blocking state [ 914.880660][T22277] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.896326][T22277] device bridge_slave_0 entered promiscuous mode [ 914.972090][T22490] chnl_net:caif_netlink_parms(): no params data found [ 915.003364][T22277] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.012868][T22277] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.030657][T22277] device bridge_slave_1 entered promiscuous mode 09:16:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 915.923561][ T3566] Bluetooth: hci1: command 0x0419 tx timeout 09:16:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:33 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:34 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:35 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:37 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:38 executing program 2: syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 922.956989][T22277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:16:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 923.448028][T22277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:16:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:40 executing program 2: syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 924.440675][T22277] team0: Port device team_slave_0 added [ 924.516466][T22490] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.528629][T22490] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.555341][ T1066] Bluetooth: hci3: command 0x0409 tx timeout 09:16:40 executing program 2: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 924.562725][T22490] device bridge_slave_0 entered promiscuous mode 09:16:42 executing program 2: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 926.633550][ T3562] Bluetooth: hci3: command 0x041b tx timeout 09:16:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:43 executing program 2: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 928.374962][T22277] team0: Port device team_slave_1 added [ 928.383802][T22490] bridge0: port 2(bridge_slave_1) entered blocking state [ 928.390891][T22490] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.435071][T22490] device bridge_slave_1 entered promiscuous mode [ 928.713750][T22076] Bluetooth: hci3: command 0x040f tx timeout 09:16:45 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:45 executing program 2: syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 930.260799][T22277] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 930.281678][T22277] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 930.353589][T22277] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 930.382671][T22277] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 930.408394][T22277] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 09:16:46 executing program 2: syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 930.465826][T22277] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 930.799185][ T3567] Bluetooth: hci3: command 0x0419 tx timeout 09:16:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:47 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 931.332264][T22490] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 931.355585][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.361887][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 09:16:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:49 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:50 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:50 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 934.541562][T22490] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:16:51 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:16:52 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) 09:16:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 937.307989][T22490] team0: Port device team_slave_0 added [ 937.316569][T22490] team0: Port device team_slave_1 added 09:16:54 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 938.091942][T22277] device hsr_slave_0 entered promiscuous mode 09:16:55 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 938.812472][T22277] device hsr_slave_1 entered promiscuous mode 09:16:55 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 939.326147][T22277] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 939.334513][T22277] Cannot create hsr debugfs directory 09:16:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:56 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) 09:16:57 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:16:58 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:58 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 942.455830][T22490] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 942.462837][T22490] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 942.523056][T22490] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 09:16:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:16:59 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 944.072128][T22490] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 944.085885][T22490] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 944.139183][T22490] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 09:17:00 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 947.453011][T22490] device hsr_slave_0 entered promiscuous mode [ 947.882126][T22490] device hsr_slave_1 entered promiscuous mode 09:17:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 948.443098][T22490] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 948.450828][T22490] Cannot create hsr debugfs directory 09:17:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 953.767500][T22660] chnl_net:caif_netlink_parms(): no params data found 09:17:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 968.310385][T22660] bridge0: port 1(bridge_slave_0) entered blocking state [ 968.342825][T22660] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.390907][T22660] device bridge_slave_0 entered promiscuous mode [ 968.638384][ T3567] Bluetooth: hci4: command 0x0409 tx timeout 09:17:25 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 970.713594][ T1066] Bluetooth: hci4: command 0x041b tx timeout 09:17:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 972.251547][T22660] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.258850][T22660] bridge0: port 2(bridge_slave_1) entered disabled state [ 972.284772][T22660] device bridge_slave_1 entered promiscuous mode [ 972.793735][ T3569] Bluetooth: hci4: command 0x040f tx timeout [ 973.043713][ T3569] Bluetooth: hci1: command 0x0409 tx timeout 09:17:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 974.883889][ T1066] Bluetooth: hci4: command 0x0419 tx timeout [ 975.123422][ T3569] Bluetooth: hci1: command 0x041b tx timeout [ 975.833514][T22076] Bluetooth: hci5: command 0x0409 tx timeout [ 977.203709][ T3569] Bluetooth: hci1: command 0x040f tx timeout 09:17:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 977.923482][ T1066] Bluetooth: hci5: command 0x041b tx timeout 09:17:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 978.563129][T22660] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 979.274846][ T1066] Bluetooth: hci1: command 0x0419 tx timeout [ 980.003470][ T3569] Bluetooth: hci5: command 0x040f tx timeout 09:17:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 982.083599][ T1066] Bluetooth: hci5: command 0x0419 tx timeout [ 982.715549][T22660] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:17:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 983.853526][T23274] chnl_net:caif_netlink_parms(): no params data found 09:17:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 988.493614][ T8529] device hsr_slave_0 left promiscuous mode [ 989.267680][ T8529] device hsr_slave_1 left promiscuous mode 09:17:46 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 989.914798][ T8529] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 989.922281][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 990.012568][ T8529] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 990.033544][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 990.422588][ T8529] device bridge_slave_1 left promiscuous mode [ 990.457410][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.713679][ T3562] Bluetooth: hci3: command 0x0409 tx timeout [ 991.196668][ T8529] device bridge_slave_0 left promiscuous mode [ 991.202924][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state 09:17:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 992.075049][T22697] syz-executor.2 (22697) used greatest stack depth: 17152 bytes left [ 992.606683][ T8529] device hsr_slave_0 left promiscuous mode [ 992.795576][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.801903][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 992.808430][T22076] Bluetooth: hci3: command 0x041b tx timeout 09:17:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 993.581613][ T8529] device hsr_slave_1 left promiscuous mode [ 994.242876][ T8529] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 994.253287][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 994.468396][ T8529] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 994.485831][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 994.873484][T22076] Bluetooth: hci3: command 0x040f tx timeout [ 994.975883][ T8529] device bridge_slave_1 left promiscuous mode [ 994.982136][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state 09:17:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 995.584088][ T8529] device bridge_slave_0 left promiscuous mode [ 995.590408][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state 09:17:52 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x0, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 996.953497][ T3567] Bluetooth: hci3: command 0x0419 tx timeout [ 997.790031][ T8529] device veth1_macvtap left promiscuous mode [ 997.796314][ T8529] device veth0_macvtap left promiscuous mode [ 997.802384][ T8529] device veth1_vlan left promiscuous mode [ 997.833630][ T8529] device veth0_vlan left promiscuous mode 09:17:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x0, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:17:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x0, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1000.063182][ T8529] device veth1_macvtap left promiscuous mode [ 1000.071169][ T8529] device veth0_macvtap left promiscuous mode [ 1000.080453][ T8529] device veth1_vlan left promiscuous mode [ 1000.090046][ T8529] device veth0_vlan left promiscuous mode 09:17:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x0, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x0, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x0, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0x0, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0x0, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0x0, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x0, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x0, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x0, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1025.593680][ T3562] Bluetooth: hci0: command 0x0406 tx timeout 09:18:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x0, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x0, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x0, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x0, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1031.419438][ T8529] team0 (unregistering): Port device team_slave_1 removed 09:18:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x0, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1032.966574][ T8529] team0 (unregistering): Port device team_slave_0 removed [ 1033.548399][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:18:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x0, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1034.597768][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1034.713479][ T2791] Bluetooth: hci6: command 0x0409 tx timeout 09:18:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x0, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x0, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1036.793570][ T3562] Bluetooth: hci6: command 0x041b tx timeout [ 1038.875272][ T1069] Bluetooth: hci6: command 0x040f tx timeout [ 1039.113544][T22076] Bluetooth: hci7: command 0x0409 tx timeout 09:18:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x0, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1040.124780][ T8529] bond0 (unregistering): Released all slaves [ 1040.953589][ T3567] Bluetooth: hci6: command 0x0419 tx timeout [ 1041.193603][ T3567] Bluetooth: hci7: command 0x041b tx timeout [ 1041.993590][ T3567] Bluetooth: hci8: command 0x0409 tx timeout 09:18:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0x0, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1043.273586][ T3567] Bluetooth: hci7: command 0x040f tx timeout [ 1044.073655][T22076] Bluetooth: hci8: command 0x041b tx timeout 09:18:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0x0, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1045.353499][T22076] Bluetooth: hci7: command 0x0419 tx timeout [ 1046.153515][ T3567] Bluetooth: hci8: command 0x040f tx timeout [ 1046.473678][ T8529] team0 (unregistering): Port device team_slave_1 removed 09:18:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0x0, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1047.370073][ T8529] team0 (unregistering): Port device team_slave_0 removed [ 1048.233523][ T3567] Bluetooth: hci8: command 0x0419 tx timeout [ 1048.507331][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1049.553988][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:18:46 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1052.730090][ T8529] bond0 (unregistering): Released all slaves 09:18:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1054.235335][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.241658][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 1054.805294][T23224] chnl_net:caif_netlink_parms(): no params data found 09:18:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1056.656821][T24524] chnl_net:caif_netlink_parms(): no params data found [ 1056.713511][ T7] Bluetooth: hci9: command 0x0409 tx timeout 09:18:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1057.952089][T24418] chnl_net:caif_netlink_parms(): no params data found [ 1058.803653][ T1066] Bluetooth: hci9: command 0x041b tx timeout 09:18:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1060.883507][ T1066] Bluetooth: hci9: command 0x040f tx timeout 09:18:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:18:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1062.963728][T22698] Bluetooth: hci9: command 0x0419 tx timeout [ 1063.427419][T24524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1063.435029][T24524] bridge0: port 1(bridge_slave_0) entered disabled state [ 1063.443255][T24524] device bridge_slave_0 entered promiscuous mode [ 1063.467340][T24364] chnl_net:caif_netlink_parms(): no params data found 09:19:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1067.584740][T24524] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.591846][T24524] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.614687][T24524] device bridge_slave_1 entered promiscuous mode [ 1067.655264][T24878] chnl_net:caif_netlink_parms(): no params data found 09:19:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1069.956720][T24524] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1069.986760][T24524] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:19:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1070.368244][T24418] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.375638][T24418] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.395751][T24418] device bridge_slave_0 entered promiscuous mode 09:19:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1071.506899][T24418] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.523515][T24418] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.531722][T24418] device bridge_slave_1 entered promiscuous mode [ 1071.599964][T24524] team0: Port device team_slave_0 added [ 1072.420781][T24524] team0: Port device team_slave_1 added 09:19:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1073.148440][T24418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:19:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1075.759652][T24418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1075.773969][T24878] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.781063][T24878] bridge0: port 1(bridge_slave_0) entered disabled state 09:19:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1075.804719][T24878] device bridge_slave_0 entered promiscuous mode [ 1075.832846][T24524] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1075.843511][T24524] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1075.943395][T24524] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1075.964973][T24364] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.972061][T24364] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.996267][T24364] device bridge_slave_0 entered promiscuous mode 09:19:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1076.498616][T24878] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.507303][T24878] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.525165][T24878] device bridge_slave_1 entered promiscuous mode [ 1077.090548][T24524] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1077.103122][T24524] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1077.153385][T24524] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1077.177285][T24364] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.184431][T24364] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.192903][T24364] device bridge_slave_1 entered promiscuous mode [ 1077.218740][T24418] team0: Port device team_slave_0 added [ 1077.893106][T24878] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:19:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1079.561367][T24418] team0: Port device team_slave_1 added 09:19:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, 0x0, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1080.900109][T24878] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1081.137037][T24364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1081.168344][T24364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1081.375837][T24418] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1081.382818][T24418] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1081.436376][T24418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1081.600220][T24524] device hsr_slave_0 entered promiscuous mode [ 1081.615840][T24524] device hsr_slave_1 entered promiscuous mode [ 1081.624134][T24524] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1081.631713][T24524] Cannot create hsr debugfs directory 09:19:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, 0x0, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1082.644673][T24878] team0: Port device team_slave_0 added [ 1082.652558][T24878] team0: Port device team_slave_1 added [ 1083.151659][T24418] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1083.176591][T24418] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1083.223379][T24418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1083.827996][T24364] team0: Port device team_slave_0 added 09:19:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, 0x0, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1084.524953][T24878] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1084.531927][T24878] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1084.574774][T24878] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1084.593749][T24364] team0: Port device team_slave_1 added 09:19:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1086.699050][T24878] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1086.709379][T24878] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1086.790713][T24878] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1087.225594][T24418] device hsr_slave_0 entered promiscuous mode [ 1087.318768][T24418] device hsr_slave_1 entered promiscuous mode [ 1087.400557][T24418] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1087.412738][T24418] Cannot create hsr debugfs directory [ 1087.433546][T24364] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1087.440512][T24364] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1087.471404][T24364] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 09:19:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1087.504848][T24364] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1087.511818][T24364] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1087.623586][T24364] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 09:19:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1089.426004][T24878] device hsr_slave_0 entered promiscuous mode [ 1089.507359][T24878] device hsr_slave_1 entered promiscuous mode [ 1089.628957][T24878] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1089.641588][T24878] Cannot create hsr debugfs directory 09:19:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1091.842861][T24364] device hsr_slave_0 entered promiscuous mode [ 1091.858738][T24364] device hsr_slave_1 entered promiscuous mode [ 1091.868453][T24364] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1091.877680][T24364] Cannot create hsr debugfs directory 09:19:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1096.946328][T24418] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1097.134384][T24524] netdevsim netdevsim4 netdevsim0: renamed from eth0 09:19:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1098.310578][T24524] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1098.397812][T24524] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1099.432419][T24418] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:19:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1100.012054][T24524] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1100.723442][ T3561] Bluetooth: hci0: command 0x0409 tx timeout [ 1100.805239][T24418] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:19:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400), 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1102.793465][ T2356] Bluetooth: hci0: command 0x041b tx timeout 09:19:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400), 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400), 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1104.873489][ T3567] Bluetooth: hci0: command 0x040f tx timeout 09:19:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e36", 0x2f, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1105.033584][ T1069] Bluetooth: hci1: command 0x0409 tx timeout [ 1105.249635][T24418] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 09:19:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e36", 0x2f, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e36", 0x2f, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1106.953542][ T2356] Bluetooth: hci0: command 0x0419 tx timeout [ 1107.113465][ T1069] Bluetooth: hci1: command 0x041b tx timeout [ 1107.558812][T25702] chnl_net:caif_netlink_parms(): no params data found [ 1107.578531][T24878] netdevsim netdevsim1 netdevsim0: renamed from eth0 09:19:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c9", 0x46, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1107.913748][T25752] Bluetooth: hci3: command 0x0409 tx timeout [ 1108.729875][T24878] netdevsim netdevsim1 netdevsim1: renamed from eth1 09:19:45 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c9", 0x46, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1109.193614][ T3562] Bluetooth: hci1: command 0x040f tx timeout [ 1109.324180][T24878] netdevsim netdevsim1 netdevsim2: renamed from eth2 09:19:46 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c9", 0x46, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1109.993472][ T1069] Bluetooth: hci3: command 0x041b tx timeout 09:19:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a", 0x52, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1110.996158][T24878] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1111.273587][ T1069] Bluetooth: hci1: command 0x0419 tx timeout 09:19:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a", 0x52, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1112.073690][ T3562] Bluetooth: hci3: command 0x040f tx timeout 09:19:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a", 0x52, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1112.212142][T25668] chnl_net:caif_netlink_parms(): no params data found [ 1112.234248][T25702] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.241327][T25702] bridge0: port 1(bridge_slave_0) entered disabled state [ 1112.294695][T25702] device bridge_slave_0 entered promiscuous mode [ 1112.352343][T25722] chnl_net:caif_netlink_parms(): no params data found [ 1112.375768][T25702] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.382947][T25702] bridge0: port 2(bridge_slave_1) entered disabled state [ 1112.414667][T25702] device bridge_slave_1 entered promiscuous mode 09:19:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1114.153498][ T2356] Bluetooth: hci3: command 0x0419 tx timeout [ 1114.629383][T25702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1114.642835][T25702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:19:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1115.676881][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.683200][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 1116.065623][T25702] team0: Port device team_slave_0 added [ 1116.086891][T25702] team0: Port device team_slave_1 added [ 1117.337922][T25668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1117.353639][T25668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1117.371539][T25668] device bridge_slave_0 entered promiscuous mode 09:19:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164", 0x5b, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:19:58 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164", 0x5b, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1122.456592][T25722] bridge0: port 1(bridge_slave_0) entered blocking state [ 1122.484032][T25722] bridge0: port 1(bridge_slave_0) entered disabled state [ 1122.492361][T25722] device bridge_slave_0 entered promiscuous mode [ 1122.526632][T25668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1122.534816][T25668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1122.543292][T25668] device bridge_slave_1 entered promiscuous mode 09:19:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164", 0x5b, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1122.713523][ T3562] Bluetooth: hci4: command 0x0409 tx timeout [ 1122.977420][T25702] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1123.003473][T25702] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1123.073521][T25702] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1123.114153][T25722] bridge0: port 2(bridge_slave_1) entered blocking state [ 1123.121260][T25722] bridge0: port 2(bridge_slave_1) entered disabled state [ 1123.154630][T25722] device bridge_slave_1 entered promiscuous mode 09:20:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee", 0x5c, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1124.226250][T25702] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1124.233232][T25702] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1124.308280][T25702] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1124.793574][ T2356] Bluetooth: hci4: command 0x041b tx timeout [ 1124.931664][T25668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1124.980770][T25722] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1124.999759][T25668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1125.259809][T25722] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:20:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee", 0x5c, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee", 0x5c, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1126.708262][T25702] device hsr_slave_0 entered promiscuous mode [ 1126.873626][ T2356] Bluetooth: hci4: command 0x040f tx timeout [ 1126.972825][T25702] device hsr_slave_1 entered promiscuous mode [ 1127.124339][T25702] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1127.131949][T25702] Cannot create hsr debugfs directory 09:20:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1128.081944][T25668] team0: Port device team_slave_0 added [ 1128.658019][T25722] team0: Port device team_slave_0 added [ 1128.675591][T25722] team0: Port device team_slave_1 added [ 1128.682993][T25668] team0: Port device team_slave_1 added [ 1128.953668][ T2356] Bluetooth: hci4: command 0x0419 tx timeout 09:20:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1130.677974][T25668] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1130.688065][T25668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1130.753607][T25668] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1130.795157][T25722] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1130.802142][T25722] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1130.863444][T25722] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1130.876202][T25722] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1130.883171][T25722] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1130.943360][T25722] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1130.986153][T25668] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1130.993131][T25668] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1131.113574][T25668] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1131.886621][T25638] syz-executor.3 (25638) used greatest stack depth: 16736 bytes left 09:20:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1132.522167][T25668] device hsr_slave_0 entered promiscuous mode [ 1132.533096][T25668] device hsr_slave_1 entered promiscuous mode [ 1132.546843][T25668] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1132.563573][T25668] Cannot create hsr debugfs directory [ 1132.611681][T25722] device hsr_slave_0 entered promiscuous mode [ 1132.624452][T25722] device hsr_slave_1 entered promiscuous mode [ 1132.631341][T25722] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1132.640521][T25722] Cannot create hsr debugfs directory [ 1133.333937][T25844] chnl_net:caif_netlink_parms(): no params data found 09:20:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1136.111437][T25702] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1136.692789][T25702] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1137.142720][T25702] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1137.216414][T25844] bridge0: port 1(bridge_slave_0) entered blocking state [ 1137.227685][T25844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.239847][T25844] device bridge_slave_0 entered promiscuous mode [ 1137.278542][T25702] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1137.456076][T25844] bridge0: port 2(bridge_slave_1) entered blocking state [ 1137.463163][T25844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.478608][T25844] device bridge_slave_1 entered promiscuous mode [ 1138.346677][T25844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1138.369477][T25844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1138.968756][T25844] team0: Port device team_slave_0 added [ 1139.007987][T25668] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1139.485263][T25844] team0: Port device team_slave_1 added [ 1139.496298][T25668] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1139.816143][T25668] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1140.799698][T25844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1140.822497][T25844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1140.873949][T25844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 09:20:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), 0x0) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1142.274292][T25668] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1142.467291][T25844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1142.475179][T25844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1142.543455][T25844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1143.120073][T25702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1145.727960][T25844] device hsr_slave_0 entered promiscuous mode [ 1145.745924][T25844] device hsr_slave_1 entered promiscuous mode [ 1145.764078][T25844] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1145.771839][T25844] Cannot create hsr debugfs directory [ 1145.791772][T25702] 8021q: adding VLAN 0 to HW filter on device team0 [ 1145.817762][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1145.826841][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1146.487896][T25668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1146.886760][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1146.899792][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1146.924030][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1146.931124][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1146.943858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1146.952708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1146.973912][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1146.981016][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1147.468996][T25668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1147.495338][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1147.504142][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1147.511977][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1147.544113][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1147.553766][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1147.562655][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1147.584592][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1147.633681][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1147.641692][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1147.664102][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1147.672572][ T2356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1147.679685][ T2356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1147.691901][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1147.706079][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1147.723993][ T2356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1147.731066][ T2356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1147.739285][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1147.749239][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1147.764389][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1147.774022][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1147.850085][T25722] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1148.106244][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1148.116866][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1148.133005][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1148.149822][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1148.166975][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1148.182991][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1148.199931][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1148.359457][T25668] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1148.376752][T25668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1148.393785][T25722] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1148.659557][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1148.671030][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1148.703744][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1148.712519][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1148.745710][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1148.757977][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1148.770138][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1148.792952][T25722] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1148.911207][T25722] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1149.092052][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1149.611847][T25668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1149.644511][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1149.652090][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1149.677424][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1149.690775][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1149.726854][T25702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1149.774927][T25985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1149.788011][T25985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1149.817718][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1149.834468][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1149.914678][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1149.923100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1149.961628][T25668] device veth0_vlan entered promiscuous mode [ 1149.990901][T25702] device veth0_vlan entered promiscuous mode [ 1150.412700][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1150.425445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1150.442495][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1150.474375][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1150.488090][T25722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1150.506518][T25668] device veth1_vlan entered promiscuous mode [ 1150.524186][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1150.544870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1150.563979][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1150.574338][T25702] device veth1_vlan entered promiscuous mode [ 1150.605716][T25722] 8021q: adding VLAN 0 to HW filter on device team0 [ 1150.626215][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1150.634548][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1150.642747][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1150.664307][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1150.672253][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1150.717160][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1150.726481][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1150.735552][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1150.754115][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1150.762617][T25752] bridge0: port 1(bridge_slave_0) entered blocking state [ 1150.769816][T25752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1150.804522][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1150.817219][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1150.827772][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1150.838599][T25668] device veth0_macvtap entered promiscuous mode [ 1150.853437][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1150.862290][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1150.874620][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1150.886445][ T1066] bridge0: port 2(bridge_slave_1) entered blocking state [ 1150.893555][ T1066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1150.910237][T25702] device veth0_macvtap entered promiscuous mode [ 1151.563925][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1151.572210][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1151.594393][T25752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1151.625825][T25702] device veth1_macvtap entered promiscuous mode [ 1151.647324][T25668] device veth1_macvtap entered promiscuous mode 09:20:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), 0x0) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1152.444824][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1152.475342][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1152.544166][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1152.558332][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1152.574314][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1152.583085][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1152.634480][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1152.642947][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1152.684164][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:20:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), 0x0) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1153.647231][T25702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1153.670897][T25702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1153.690343][T25702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1153.711445][T25702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1153.731279][T25702] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1153.746199][T25722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1153.774894][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1153.786966][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1153.814528][T25668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1153.833481][T25668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1153.853341][T25668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1153.873340][T25668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1153.883240][T25668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1153.916645][T25668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1153.956436][T25668] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1153.966496][T25702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1153.982792][T25702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1153.998030][T25702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1154.012350][T25702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1154.028993][T25702] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1154.039184][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1154.054304][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1154.063256][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1154.094762][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1154.132093][T25668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1154.147275][T25668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1154.194900][T25668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1154.214589][T25668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1154.244463][T25668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1154.263492][T25668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1154.284861][T25668] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1154.298392][T25702] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.323568][T25702] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.332448][T25702] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.353431][T25702] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.388489][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1154.397483][ T2356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1154.426966][T25668] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.453648][T25668] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.483921][T25668] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.492659][T25668] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1154.858906][T25844] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1154.963799][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1154.971465][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1155.080252][T25844] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1155.152275][T25722] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1155.383217][T25844] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1155.480374][T25844] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1156.206492][T21757] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1156.218706][T21757] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1156.303728][T25753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1156.364525][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1156.372656][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1156.402575][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1156.423115][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1156.449635][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1156.467897][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:20:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1156.531294][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1156.551956][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1156.569283][T25844] 8021q: adding VLAN 0 to HW filter on device bond0 09:20:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1156.619291][T25753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1156.628155][T25753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1156.659968][T25753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1156.688888][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 09:20:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d", 0x56, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1156.704146][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1156.719502][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1156.739547][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 09:20:33 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1156.771288][T25722] device veth0_vlan entered promiscuous mode [ 1156.783934][T25844] 8021q: adding VLAN 0 to HW filter on device team0 [ 1156.824478][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1156.833206][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1156.860366][T25722] device veth1_vlan entered promiscuous mode 09:20:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39", 0x57, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1156.895340][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1156.904488][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1156.923440][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1156.943976][ T3567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1156.951086][ T3567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1156.993826][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1157.002807][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1157.063931][ T3567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1157.071051][ T3567] bridge0: port 2(bridge_slave_1) entered forwarding state 09:20:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39", 0x57, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1157.128055][T22076] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1157.139450][T22076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1157.153911][T22076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:20:33 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1157.201771][T25722] device veth0_macvtap entered promiscuous mode [ 1157.249087][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1157.258690][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1157.292216][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1157.305602][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1157.329197][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 09:20:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39", 0x57, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1157.364083][T25722] device veth1_macvtap entered promiscuous mode [ 1157.381539][T25844] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1157.443360][T25844] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1157.476667][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1157.494427][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1157.526538][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1157.548968][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1157.576971][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 09:20:34 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1157.604597][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1157.626456][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1157.664375][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1157.703123][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 09:20:34 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1157.743751][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1157.773506][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1157.853372][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1157.863291][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1157.903578][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1157.923386][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1157.944128][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:20:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1157.965117][T25722] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1157.972549][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1157.988626][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1157.998625][ T3567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1158.012992][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1158.034046][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1158.093431][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1158.124646][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1158.134900][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1158.149552][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1158.177030][T25722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1158.203393][T25722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1158.215212][T25722] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1158.233540][T25753] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1158.244517][T25753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1158.279912][T25844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1158.301798][T25722] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1158.324318][T25722] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1158.333056][T25722] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1158.363557][T25722] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 09:20:34 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1158.381699][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1158.389365][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 09:20:34 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1158.634070][ T2180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1158.642858][ T2180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 09:20:35 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), 0x0) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1159.062188][T25844] device veth0_vlan entered promiscuous mode [ 1159.094115][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1159.114252][ T2791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1159.145551][T25844] device veth1_vlan entered promiscuous mode [ 1159.156523][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1159.183591][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1159.205237][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1159.215788][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1159.224318][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1159.241434][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1159.260153][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1159.282494][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1159.308408][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1159.334046][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1159.342190][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 09:20:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0xf8, 0x15}, 0x40) [ 1159.384459][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1159.409656][T25844] device veth0_macvtap entered promiscuous mode 09:20:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1159.446415][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1159.457627][T25844] device veth1_macvtap entered promiscuous mode 09:20:35 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1159.501850][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 09:20:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}], 0xd8, 0x15}, 0x40) [ 1159.548472][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}], 0xd8, 0x15}, 0x40) [ 1159.592152][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.616116][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0xb8, 0x15}, 0x40) [ 1159.656248][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.683904][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.727009][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.766543][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.784207][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x98, 0x15}, 0x40) [ 1159.825719][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.870414][T25844] batman_adv: batadv0: Interface activated: batadv_slave_0 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x98, 0x15}, 0x40) [ 1159.918124][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1159.934689][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x15}, 0x40) [ 1159.966342][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1159.977814][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:20:36 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x15}, 0x40) [ 1160.033877][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.053333][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.063233][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.123341][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.133189][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 09:20:36 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x15}, 0x40) [ 1160.186041][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58, 0x15}, 0x40) [ 1160.236856][T25844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.267907][T25844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.305301][T25844] batman_adv: batadv0: Interface activated: batadv_slave_1 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x15}, 0x40) [ 1160.356094][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1160.374165][T25754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1160.414216][T25844] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1160.422953][T25844] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1160.451414][T25844] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 09:20:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x15}, 0x40) [ 1160.473689][T25844] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 09:20:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x15}, 0x40) 09:20:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)}, 0x40) 09:20:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)}, 0x40) 09:20:37 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)}, 0x0) 09:20:37 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:37 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:37 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:37 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:37 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), 0x0) 09:20:37 executing program 4: syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:38 executing program 4: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:38 executing program 2: syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:38 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), 0x0) 09:20:38 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:38 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:38 executing program 2: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:38 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:20:39 executing program 4: syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:39 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), 0x0) 09:20:39 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:39 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:40 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:40 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:40 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) 09:20:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:41 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:20:41 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:41 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) 09:20:41 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:42 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), 0x0) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:42 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:43 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) [ 1166.651509][ T5649] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1166.683441][ T5649] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1166.695308][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1166.738086][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1166.758985][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1166.794057][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:20:43 executing program 1: syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)) 09:20:43 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:43 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), 0x0) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:43 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), 0x0) r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:44 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:44 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:44 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") 09:20:45 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:45 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:45 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") 09:20:46 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:46 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:46 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:46 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, 0x0, &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:47 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") 09:20:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:47 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:47 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:48 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:48 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") 09:20:49 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:50 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") 09:20:50 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:51 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:51 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:51 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423b") 09:20:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:52 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:52 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:52 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") [ 1177.075425][ T8529] device hsr_slave_0 left promiscuous mode [ 1177.081938][ T8529] device hsr_slave_1 left promiscuous mode [ 1177.107026][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1177.115689][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.122032][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 09:20:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1177.412399][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1177.463754][ T8529] device bridge_slave_1 left promiscuous mode [ 1177.497308][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.540669][ T8529] device bridge_slave_0 left promiscuous mode [ 1177.551166][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.582010][ T8529] device bridge_slave_1 left promiscuous mode [ 1177.594085][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.620224][ T8529] device bridge_slave_0 left promiscuous mode [ 1177.627751][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.658447][ T8529] device hsr_slave_0 left promiscuous mode [ 1177.670074][ T8529] device hsr_slave_1 left promiscuous mode [ 1177.686918][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1177.699805][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1177.720827][ T8529] device bridge_slave_1 left promiscuous mode [ 1177.736752][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.757688][ T8529] device bridge_slave_0 left promiscuous mode [ 1177.771144][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.800860][ T8529] device hsr_slave_0 left promiscuous mode [ 1177.826559][ T8529] device hsr_slave_1 left promiscuous mode 09:20:54 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1178.264441][ T8529] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1178.272446][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1178.307463][ T8529] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1178.327370][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1178.347462][ T8529] device bridge_slave_1 left promiscuous mode [ 1178.360595][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1178.383858][ T8529] device bridge_slave_0 left promiscuous mode [ 1178.392440][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state 09:20:55 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:55 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") 09:20:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 09:20:56 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:56 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:20:57 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") 09:20:57 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) 09:20:57 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:20:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:20:57 executing program 1: mkdir(0x0, 0xb0) 09:20:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:20:58 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") 09:20:58 executing program 1: mkdir(0x0, 0xb0) 09:20:58 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1182.466126][ T8529] device hsr_slave_0 left promiscuous mode 09:20:59 executing program 1: mkdir(0x0, 0xb0) 09:20:59 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") 09:20:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:20:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1183.104350][ T8529] device hsr_slave_1 left promiscuous mode [ 1183.223808][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1183.290615][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1183.375881][ T8529] device bridge_slave_1 left promiscuous mode [ 1183.393455][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1183.635920][ T8529] device bridge_slave_0 left promiscuous mode [ 1183.646063][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state 09:21:00 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1184.350211][ T8529] device hsr_slave_0 left promiscuous mode [ 1184.363930][ T8529] device hsr_slave_1 left promiscuous mode [ 1184.443764][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1184.455733][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1184.475639][ T8529] device bridge_slave_1 left promiscuous mode [ 1184.482059][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1184.514693][ T8529] device bridge_slave_0 left promiscuous mode [ 1184.520926][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.549080][ T8529] device hsr_slave_0 left promiscuous mode [ 1184.557105][ T8529] device hsr_slave_1 left promiscuous mode [ 1184.575814][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1184.591042][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1184.884986][ T8529] device bridge_slave_1 left promiscuous mode [ 1184.891432][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1184.925537][ T8529] device bridge_slave_0 left promiscuous mode [ 1184.945452][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.978327][ T8529] device hsr_slave_0 left promiscuous mode [ 1184.988723][ T8529] device hsr_slave_1 left promiscuous mode [ 1185.007463][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1185.032704][ T8529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1185.053011][ T8529] device bridge_slave_1 left promiscuous mode [ 1185.061730][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.073031][ T8529] device bridge_slave_0 left promiscuous mode [ 1185.080593][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.097855][ T8529] device bridge_slave_1 left promiscuous mode [ 1185.106507][ T8529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.124640][ T8529] device bridge_slave_0 left promiscuous mode [ 1185.132123][ T8529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.163114][ T8529] device veth1_macvtap left promiscuous mode [ 1185.172455][ T8529] device veth0_macvtap left promiscuous mode [ 1185.181255][ T8529] device veth1_vlan left promiscuous mode [ 1185.189558][ T8529] device veth0_vlan left promiscuous mode 09:21:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) 09:21:03 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:03 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") 09:21:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) 09:21:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) 09:21:04 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:04 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") 09:21:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r3 = gettid() syz_open_procfs$namespace(r3, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:21:05 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:05 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:06 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") 09:21:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r3 = gettid() syz_open_procfs$namespace(r3, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:21:06 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:07 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r3 = gettid() syz_open_procfs$namespace(r3, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:21:07 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") 09:21:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:07 executing program 2: syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:21:08 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") 09:21:09 executing program 2: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:10 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") 09:21:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:11 executing program 2: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:12 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9") 09:21:12 executing program 2: syz_clone(0x0, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1197.237281][ T8529] team0 (unregistering): Port device team_slave_1 removed [ 1197.371899][ T8529] team0 (unregistering): Port device team_slave_0 removed [ 1197.407673][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1200.343843][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1207.505408][ T8529] bond0 (unregistering): Released all slaves 09:21:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 09:21:24 executing program 2: syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:24 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9") 09:21:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:25 executing program 2: syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:25 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9") 09:21:26 executing program 2: syz_clone(0x8200080, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:21:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:27 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9") 09:21:28 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1211.993558][ T2356] Bluetooth: hci3: command 0x0409 tx timeout 09:21:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:29 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9") 09:21:29 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1214.073529][ T1069] Bluetooth: hci3: command 0x041b tx timeout 09:21:30 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) 09:21:30 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:32 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1216.154345][ T7] Bluetooth: hci3: command 0x040f tx timeout 09:21:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:33 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) 09:21:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) [ 1217.392798][ T8529] bond0 (unregistering): Released all slaves 09:21:33 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:34 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) [ 1218.233559][ T7] Bluetooth: hci3: command 0x0419 tx timeout 09:21:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:36 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) 09:21:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r1, r0, r0, r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1220.713488][T25985] Bluetooth: hci4: command 0x0409 tx timeout 09:21:37 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d6") 09:21:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r1, r0, r0, r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:38 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:39 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="e0") [ 1222.734237][ T8529] bond0 (unregistering): Released all slaves [ 1222.793433][ T7] Bluetooth: hci4: command 0x041b tx timeout 09:21:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r1, r0, r0, r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:40 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) [ 1223.757991][T26732] cgroup: fork rejected by pids controller in /syz0 09:21:40 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) [ 1224.191199][ T8529] bond0 (unregistering): Released all slaves [ 1224.565817][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:21:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, 0x0, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1224.873386][T25985] Bluetooth: hci4: command 0x040f tx timeout [ 1225.024052][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1225.273382][ T7] Bluetooth: hci0: command 0x0406 tx timeout [ 1225.283661][ T7] Bluetooth: hci1: command 0x0406 tx timeout 09:21:42 executing program 2: syz_clone(0x8200080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) 09:21:42 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) 09:21:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, 0x0, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1226.953353][ T7] Bluetooth: hci4: command 0x0419 tx timeout 09:21:43 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, 0x0, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, 0x0, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:44 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) 09:21:45 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:45 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}], 0x20}, 0x0) r6 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r1, r0, r0, r0, r0, r2, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:46 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 09:21:46 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:47 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9") 09:21:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:48 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:48 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 09:21:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:49 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 09:21:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:51 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:21:51 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 09:21:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1236.919763][ T8529] bond0 (unregistering): Released all slaves 09:21:53 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) 09:21:53 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 09:21:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1238.555492][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.561840][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 09:21:55 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r2 = gettid() syz_open_procfs$namespace(r2, 0x0) 09:21:55 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) 09:21:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:57 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:21:58 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") gettid() 09:21:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:21:59 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r2 = gettid() syz_open_procfs$namespace(r2, 0x0) 09:22:00 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") 09:22:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) 09:22:03 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") [ 1247.470320][ T8529] team0 (unregistering): Port device team_slave_1 removed 09:22:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:04 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) [ 1247.832246][ T8529] team0 (unregistering): Port device team_slave_0 removed [ 1247.848630][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1247.867431][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:22:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:06 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:06 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:07 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:08 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) 09:22:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:10 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) 09:22:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1255.123802][ T8529] bond0 (unregistering): Released all slaves 09:22:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{0x0}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:12 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) 09:22:13 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:13 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:13 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{0x0}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:14 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{0x0}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:15 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{0x0}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:16 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{0x0}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:17 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:18 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{0x0}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:19 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:21 executing program 0: mkdir(0x0, 0xb0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:21 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{0x0}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1266.135245][ T8529] team0 (unregistering): Port device team_slave_1 removed 09:22:22 executing program 0: mkdir(0x0, 0xb0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5", 0x31}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1267.391631][ T8529] team0 (unregistering): Port device team_slave_0 removed 09:22:24 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) 09:22:24 executing program 0: mkdir(0x0, 0xb0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1268.314816][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:22:25 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:22:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5", 0x31}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:26 executing program 2: mkdir(0x0, 0xb0) [ 1270.426437][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:22:27 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) 09:22:27 executing program 2: mkdir(0x0, 0xb0) 09:22:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5", 0x31}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:28 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) 09:22:28 executing program 2: mkdir(0x0, 0xb0) 09:22:29 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5", 0x31}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:29 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 09:22:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211ba", 0x4a}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:30 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 09:22:31 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5", 0x31}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:31 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5", 0x31}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211ba", 0x4a}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:34 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211ba", 0x4a}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1278.153451][ T1069] Bluetooth: hci5: command 0x0409 tx timeout 09:22:34 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1279.439315][ T8529] bond0 (unregistering): Released all slaves 09:22:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211ba", 0x4a}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:36 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1280.233492][ T1069] Bluetooth: hci5: command 0x041b tx timeout 09:22:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db9285634", 0x56}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:37 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1282.313507][ T3567] Bluetooth: hci5: command 0x040f tx timeout 09:22:39 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db9285634", 0x56}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1284.393498][ T7] Bluetooth: hci5: command 0x0419 tx timeout 09:22:41 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db9285634", 0x56}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db9285634", 0x56}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:42 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db9285634", 0x56}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f51", 0x5c}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1286.803424][T22698] Bluetooth: hci0: command 0x0409 tx timeout 09:22:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db9285634", 0x56}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f51", 0x5c}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1288.873385][ T7] Bluetooth: hci0: command 0x041b tx timeout 09:22:46 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73d") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:22:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f51", 0x5c}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1290.953366][ T3567] Bluetooth: hci0: command 0x040f tx timeout 09:22:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0", 0x5f}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:48 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f51", 0x5c}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1293.033366][ T2356] Bluetooth: hci0: command 0x0419 tx timeout 09:22:50 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0", 0x5f}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:50 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f51", 0x5c}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1295.123937][ T8529] team0 (unregistering): Port device team_slave_1 removed 09:22:52 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0", 0x5f}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:52 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1296.226654][ T8529] team0 (unregistering): Port device team_slave_0 removed 09:22:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b02878", 0x61}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1297.524730][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:22:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b02878", 0x61}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:55 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b02878", 0x61}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1299.134371][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1299.996610][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1300.002945][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 09:22:57 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:22:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b02878", 0x61}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:00 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b02878", 0x61}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, 0x0, 0x0, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:02 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:03 executing program 2: syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:23:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, 0x0, 0x0, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1308.587084][ T8529] bond0 (unregistering): Released all slaves 09:23:05 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, 0x0, 0x0, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1309.673415][ T1069] Bluetooth: hci6: command 0x0409 tx timeout 09:23:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, 0x0, 0x0, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1311.753363][ T1069] Bluetooth: hci6: command 0x041b tx timeout 09:23:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, 0x0, 0x0, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1313.833364][ T1069] Bluetooth: hci6: command 0x040f tx timeout 09:23:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r4 = gettid() syz_open_procfs$namespace(r4, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, 0x0, 0x0, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r5, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1315.913343][ T3567] Bluetooth: hci6: command 0x0419 tx timeout 09:23:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:14 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0", 0x58, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a7") 09:23:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:17 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r3 = gettid() syz_open_procfs$namespace(r3, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) 09:23:19 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1324.537767][ T8529] team0 (unregistering): Port device team_slave_1 removed [ 1325.720230][ T8529] team0 (unregistering): Port device team_slave_0 removed 09:23:22 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), 0x0, &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r3 = gettid() syz_open_procfs$namespace(r3, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) [ 1326.566458][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:23:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:24 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1328.098669][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:23:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:26 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1332.793339][ T1069] Bluetooth: hci3: command 0x0406 tx timeout [ 1333.024380][ T8529] bond0 (unregistering): Released all slaves 09:23:29 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x118, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:31 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1335.334647][ T8529] team0 (unregistering): Port device team_slave_1 removed [ 1335.514720][ T8529] team0 (unregistering): Port device team_slave_0 removed [ 1335.738005][ T8529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:23:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1337.411783][ T8529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:23:33 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:23:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) r7 = syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r8 = gettid() syz_open_procfs$namespace(r8, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r9, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:35 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:23:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:23:37 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1340.857010][ T8529] bond0 (unregistering): Released all slaves [ 1340.955450][ T27] INFO: task kworker/0:5:22076 blocked for more than 143 seconds. [ 1340.965791][ T27] Not tainted 5.15.149-syzkaller #0 [ 1340.971541][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1340.980482][ T27] task:kworker/0:5 state:D stack:25176 pid:22076 ppid: 2 flags:0x00004000 [ 1340.989901][ T27] Workqueue: events linkwatch_event [ 1340.995304][ T27] Call Trace: [ 1340.998596][ T27] [ 1341.001544][ T27] __schedule+0x12c4/0x45b0 [ 1341.006192][ T27] ? mark_lock+0x98/0x340 [ 1341.010653][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1341.016750][ T27] ? __sched_text_start+0x8/0x8 [ 1341.021637][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1341.028090][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1341.033555][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1341.038779][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1341.044165][ T27] schedule+0x11b/0x1f0 [ 1341.048362][ T27] schedule_preempt_disabled+0xf/0x20 [ 1341.053938][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1341.059185][ T27] ? linkwatch_event+0xa/0x50 [ 1341.064777][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1341.070000][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1341.076419][ T27] ? print_irqtrace_events+0x210/0x210 [ 1341.082569][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1341.088003][ T27] mutex_lock_nested+0x17/0x20 [ 1341.092798][ T27] linkwatch_event+0xa/0x50 [ 1341.097385][ T27] process_one_work+0x8a1/0x10c0 [ 1341.102423][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1341.123352][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1341.132480][ T27] ? kthread_data+0x4e/0xc0 [ 1341.137169][ T27] ? wq_worker_running+0x97/0x170 [ 1341.142234][ T27] worker_thread+0xaca/0x1280 [ 1341.158553][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1341.190958][ T27] kthread+0x3f6/0x4f0 [ 1341.195203][ T27] ? rcu_lock_release+0x20/0x20 [ 1341.200082][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1341.221490][ T27] ret_from_fork+0x1f/0x30 [ 1341.237485][ T27] [ 1341.244901][ T27] INFO: task kworker/1:23:25754 blocked for more than 143 seconds. [ 1341.252818][ T27] Not tainted 5.15.149-syzkaller #0 [ 1341.258623][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1341.311639][ T27] task:kworker/1:23 state:D stack:23680 pid:25754 ppid: 2 flags:0x00004000 [ 1341.321011][ T27] Workqueue: events switchdev_deferred_process_work [ 1341.356517][ T27] Call Trace: [ 1341.359842][ T27] [ 1341.362806][ T27] __schedule+0x12c4/0x45b0 [ 1341.393968][ T27] ? mark_lock+0x98/0x340 [ 1341.398359][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1341.418671][ T27] ? __sched_text_start+0x8/0x8 [ 1341.429267][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1341.443329][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1341.457420][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1341.462668][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1341.476813][ T27] schedule+0x11b/0x1f0 [ 1341.481019][ T27] schedule_preempt_disabled+0xf/0x20 [ 1341.500966][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1341.510853][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1341.519051][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1341.525716][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1341.531739][ T27] ? print_irqtrace_events+0x210/0x210 [ 1341.537297][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1341.542526][ T27] mutex_lock_nested+0x17/0x20 [ 1341.593274][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1341.599315][ T27] process_one_work+0x8a1/0x10c0 [ 1341.625246][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1341.630945][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1341.645956][ T27] ? kthread_data+0x4e/0xc0 [ 1341.654633][ T27] ? wq_worker_running+0x97/0x170 [ 1341.659711][ T27] worker_thread+0xaca/0x1280 [ 1341.687948][ T27] kthread+0x3f6/0x4f0 [ 1341.692319][ T27] ? rcu_lock_release+0x20/0x20 [ 1341.707251][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1341.720910][ T27] ret_from_fork+0x1f/0x30 [ 1341.730963][ T27] [ 1341.745845][ T27] INFO: task syz-executor.1:26365 blocked for more than 144 seconds. [ 1341.767205][ T27] Not tainted 5.15.149-syzkaller #0 [ 1341.772972][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1341.822060][ T27] task:syz-executor.1 state:D stack:20920 pid:26365 ppid: 25844 flags:0x00004006 [ 1341.871215][ T27] Call Trace: [ 1341.874635][ T27] [ 1341.877605][ T27] __schedule+0x12c4/0x45b0 [ 1341.882167][ T27] ? __sched_text_start+0x8/0x8 [ 1341.887126][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1341.892617][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1341.943942][ T27] schedule+0x11b/0x1f0 [ 1341.948161][ T27] schedule_preempt_disabled+0xf/0x20 [ 1341.971045][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1341.978899][ T27] ? tun_chr_close+0x3a/0x1b0 [ 1342.011419][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1342.023298][ T27] ? __fsnotify_update_child_dentry_flags+0x2a0/0x2a0 [ 1342.030180][ T27] mutex_lock_nested+0x17/0x20 [ 1342.054102][ T27] tun_chr_close+0x3a/0x1b0 [ 1342.058718][ T27] ? tun_chr_open+0x4d0/0x4d0 [ 1342.063481][ T27] __fput+0x3bf/0x890 [ 1342.067500][ T27] task_work_run+0x129/0x1a0 [ 1342.072126][ T27] do_exit+0x6a3/0x2480 [ 1342.090531][ T27] ? put_task_struct+0x80/0x80 [ 1342.103744][ T27] ? get_signal+0x8ac/0x14e0 [ 1342.108448][ T27] do_group_exit+0x144/0x310 [ 1342.113064][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1342.143293][ T27] get_signal+0xc66/0x14e0 [ 1342.147868][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 1342.173342][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1342.178670][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1342.212096][ T27] ? _raw_spin_unlock+0x40/0x40 [ 1342.250263][ T27] ? get_sigframe_size+0x10/0x10 [ 1342.255446][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 1342.261042][ T27] ? force_sig+0x114/0x1d0 [ 1342.275942][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 1342.281585][ T27] exit_to_user_mode_loop+0x97/0x130 [ 1342.286988][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 1342.292563][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 1342.298201][ T27] exc_general_protection+0x358/0x4f0 [ 1342.303676][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 1342.309035][ T27] ? __context_tracking_enter+0x5f/0x90 [ 1342.314867][ T27] asm_exc_general_protection+0x22/0x30 [ 1342.320966][ T27] RIP: 0033:0x7f7f54a38db1 [ 1342.325498][ T27] RSP: 002b:0000000020000450 EFLAGS: 00010217 [ 1342.331589][ T27] RAX: 0000000000000000 RBX: 00007f7f54b66f80 RCX: 00007f7f54a38da9 [ 1342.358330][ T27] RDX: 0000000020000340 RSI: 0000000020000450 RDI: 0000000008200080 [ 1342.366473][ T27] RBP: 00007f7f54a8547a R08: 00000000200004c0 R09: 00000000200004c0 [ 1342.383915][ T27] R10: 0000000020000480 R11: 0000000000000202 R12: 0000000000000000 [ 1342.391937][ T27] R13: 000000000000000b R14: 00007f7f54b66f80 R15: 00007fff6885dc18 [ 1342.413341][ T27] [ 1342.416414][ T27] INFO: task syz-executor.4:26505 blocked for more than 144 seconds. [ 1342.436636][ T27] Not tainted 5.15.149-syzkaller #0 [ 1342.442391][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1342.451333][ T27] task:syz-executor.4 state:D stack:20856 pid:26505 ppid: 25722 flags:0x00004006 [ 1342.483327][ T27] Call Trace: [ 1342.486655][ T27] [ 1342.489609][ T27] __schedule+0x12c4/0x45b0 [ 1342.513352][ T27] ? __sched_text_start+0x8/0x8 [ 1342.518251][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1342.523816][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1342.529039][ T27] schedule+0x11b/0x1f0 [ 1342.553904][ T27] schedule_preempt_disabled+0xf/0x20 [ 1342.559333][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1342.578012][ T27] ? tun_chr_close+0x3a/0x1b0 [ 1342.582749][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1342.588062][ T27] ? __fsnotify_update_child_dentry_flags+0x2a0/0x2a0 [ 1342.612250][ T27] mutex_lock_nested+0x17/0x20 [ 1342.630635][ T27] tun_chr_close+0x3a/0x1b0 [ 1342.638616][ T27] ? tun_chr_open+0x4d0/0x4d0 [ 1342.643389][ T27] __fput+0x3bf/0x890 [ 1342.647412][ T27] task_work_run+0x129/0x1a0 [ 1342.652028][ T27] do_exit+0x6a3/0x2480 [ 1342.673336][ T27] ? put_task_struct+0x80/0x80 [ 1342.678226][ T27] ? get_signal+0x8ac/0x14e0 [ 1342.682865][ T27] do_group_exit+0x144/0x310 [ 1342.687610][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1342.692843][ T27] get_signal+0xc66/0x14e0 [ 1342.723310][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 1342.729006][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1342.742392][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1342.748408][ T27] ? _raw_spin_unlock+0x40/0x40 [ 1342.768398][ T27] ? get_sigframe_size+0x10/0x10 [ 1342.776061][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 1342.781831][ T27] ? force_sig+0x114/0x1d0 [ 1342.786377][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 1342.791866][ T27] exit_to_user_mode_loop+0x97/0x130 [ 1342.826578][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 1342.832189][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 1342.848263][ T27] exc_general_protection+0x358/0x4f0 [ 1342.858683][ T27] ? vtime_user_enter+0x1eb/0x2d0 [ 1342.863850][ T27] ? __context_tracking_enter+0x5f/0x90 [ 1342.869449][ T27] asm_exc_general_protection+0x22/0x30 [ 1342.891807][ T27] RIP: 0033:0x7f3d0391adb1 [ 1342.906351][ T27] RSP: 002b:0000000020000450 EFLAGS: 00010217 [ 1342.912463][ T27] RAX: 0000000000000000 RBX: 00007f3d03a48f80 RCX: 00007f3d0391ada9 09:23:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1342.935747][ T27] RDX: 0000000020000340 RSI: 0000000020000450 RDI: 0000000008200080 [ 1342.943829][ T27] RBP: 00007f3d0396747a R08: 00000000200004c0 R09: 00000000200004c0 [ 1342.991398][ T27] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 1343.009257][ T27] R13: 000000000000000b R14: 00007f3d03a48f80 R15: 00007ffefc403368 [ 1343.030579][ T27] [ 1343.033875][ T1069] Bluetooth: hci4: command 0x0406 tx timeout [ 1343.046104][ T27] [ 1343.046104][ T27] Showing all locks held in the system: [ 1343.066125][ T27] 1 lock held by khungtaskd/27: [ 1343.071003][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1343.095821][ T27] 3 locks held by kworker/1:2/1066: [ 1343.101052][ T27] #0: ffff888024215138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1343.112139][ T27] #1: ffffc90004ecfd20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1343.163293][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1343.172900][ T27] 2 locks held by getty/3262: [ 1343.197800][ T27] #0: ffff888024b66098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1343.217824][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1343.238221][ T27] 3 locks held by syz-executor.3/3524: [ 1343.254466][ T27] 3 locks held by kworker/0:7/3567: 09:23:39 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") [ 1343.259708][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1343.313317][ T27] #1: ffffc900046dfd20 (free_ipc_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1343.323059][ T27] #2: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1343.363287][ T27] 3 locks held by kworker/u4:7/5649: [ 1343.368620][ T27] 5 locks held by kworker/u4:8/8529: [ 1343.378751][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1343.412575][ T27] #1: ffffc90004f97d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1343.435461][ T27] #2: ffffffff8d9cff10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1343.445124][ T27] #3: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1343.492035][ T27] #4: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1343.523309][ T27] 7 locks held by kworker/u4:0/1761: [ 1343.528632][ T27] 2 locks held by kworker/1:6/2791: [ 1343.553324][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1343.582392][ T27] #1: ffffc90004fe7d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1343.613314][ T27] 3 locks held by kworker/0:5/22076: [ 1343.618635][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1343.629209][ T27] #1: ffffc90003a9fd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1343.683372][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1343.692427][ T27] 3 locks held by kworker/1:23/25754: [ 1343.719618][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1343.730141][ T27] #1: ffffc90003b7fd20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1343.777422][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1343.788063][ T27] 3 locks held by kworker/0:6/25985: [ 1343.813981][ T27] #0: ffff888011c71938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1343.825874][ T27] #1: ffffc90003277d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1343.861935][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1343.883691][ T27] 1 lock held by syz-executor.1/26365: [ 1343.899858][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1343.920241][ T27] 1 lock held by syz-executor.4/26505: [ 1343.935587][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1343.956425][ T27] 1 lock held by syz-executor.2/26593: [ 1343.973341][ T27] #0: ffff88814adaebd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1344.004758][ T27] 1 lock held by syz-executor.2/26603: [ 1344.010252][ T27] 1 lock held by syz-executor.3/26610: [ 1344.036305][ T27] 1 lock held by syz-executor.3/26620: [ 1344.041804][ T27] 1 lock held by syz-executor.1/26629: [ 1344.067693][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1344.093329][ T27] 1 lock held by syz-executor.4/26697: [ 1344.098831][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1344.136695][ T27] 2 locks held by syz-executor.2/26911: [ 1344.142285][ T27] 1 lock held by syz-executor.0/26916: [ 1344.162893][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1344.187249][ T27] 1 lock held by syz-executor.3/26919: [ 1344.202553][ T27] 2 locks held by syz-executor.2/26926: [ 1344.218928][ T27] 3 locks held by syz-executor.3/26931: [ 1344.233358][ T7] Bluetooth: hci7: command 0x0409 tx timeout [ 1344.241818][ T27] 1 lock held by syz-executor.2/26940: [ 1344.263302][ T27] 2 locks held by syz-executor.3/26945: [ 1344.271857][ T27] 1 lock held by syz-executor.3/26961: [ 1344.287251][ T27] 1 lock held by syz-executor.2/26975: [ 1344.292765][ T27] 3 locks held by syz-executor.2/26991: [ 1344.317567][ T27] 2 locks held by syz-executor.2/27006: [ 1344.332848][ T27] 3 locks held by syz-executor.3/27007: [ 1344.348614][ T27] 2 locks held by syz-executor.2/27025: [ 1344.363909][ T27] 1 lock held by syz-executor.3/27027: [ 1344.369399][ T27] 1 lock held by syz-executor.2/27035: [ 1344.397954][ T27] 1 lock held by syz-executor.3/27042: [ 1344.410260][ T27] 3 locks held by syz-executor.3/27053: [ 1344.427692][ T27] 2 locks held by syz-executor.3/27069: [ 1344.445191][ T27] 1 lock held by syz-executor.3/27085: [ 1344.450691][ T27] 1 lock held by syz-executor.1/27269: [ 1344.478472][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1344.503611][ T27] 1 lock held by syz-executor.2/27276: [ 1344.520527][ T27] 1 lock held by syz-executor.3/27317: [ 1344.537116][ T27] 1 lock held by syz-executor.2/27323: [ 1344.558053][ T27] 1 lock held by syz-executor.4/27325: [ 1344.570706][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1344.598229][ T27] 1 lock held by syz-executor.2/27336: [ 1344.611134][ T27] #0: ffff88814adaebd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1344.646655][ T27] 1 lock held by syz-executor.3/27340: [ 1344.652146][ T27] 1 lock held by syz-executor.2/27348: [ 1344.671357][ T27] 1 lock held by syz-executor.3/27352: [ 1344.689616][ T27] 1 lock held by syz-executor.2/27361: [ 1344.703302][ T27] #0: ffff88814adaebd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1344.728916][ T27] 1 lock held by syz-executor.3/27364: [ 1344.744993][ T27] #0: ffff88814adaebd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1344.776727][ T27] 1 lock held by syz-executor.3/27372: [ 1344.782324][ T27] 1 lock held by syz-executor.2/27377: [ 1344.807277][ T27] 3 locks held by syz-executor.3/27386: [ 1344.812945][ T27] 1 lock held by syz-executor.2/27388: [ 1344.838058][ T27] 3 locks held by syz-executor.3/27393: [ 1344.856749][ T27] 3 locks held by syz-executor.2/27399: [ 1344.862415][ T27] 1 lock held by syz-executor.3/27404: [ 1344.885534][ T27] #0: ffff88814adaebd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1344.914043][ T27] 1 lock held by syz-executor.3/27413: [ 1344.919548][ T27] 1 lock held by syz-executor.2/27414: 09:23:41 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") 09:23:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xb0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7f, 0xc0, 0x8, 0x6, 0x0, 0x4, 0x18404, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3, 0x12}, 0x15004, 0xc7, 0x0, 0x8, 0x4, 0x7, 0x52, 0x0, 0xac2, 0x0, 0x505}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x20}, 0x0) syz_clone(0x8200080, &(0x7f0000000400)="01ca579c591e9517039e5d2504ea8f1bcdd5c0f91071806282b476c3019e188ec84963b083f093bbfd23bdbd170e364ed69e51bc4caa2c288617ac022eaf306a7e7831f1d9c93e92f0006e9e8874710a6f3a560b083d39e0b84164ee33", 0x5d, &(0x7f0000000340), &(0x7f0000000480), &(0x7f00000004c0)="e0d528e17ff110ac5c9e3bcbc4c14ff44edf5451cf6fca44b9fafad8d351a3c328d643e210b549e3a9b61d58eee27c0a57423ba11c70b493a950b2f700f691a9a73dff") r7 = gettid() syz_open_procfs$namespace(r7, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="bb2dd93ee2226051afafe8e729f125dfd086d023353d8e17eaa8ddb10e1f14782f0ec7cba215ff1f7bfa2d50dff5e979f5d50673ff7125f32de152f82c98ea291df9f29b90090aa211baebe5a38880ba4e6db928563411f78d346f517b72b0287882", 0x62}], 0x1, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [r0, r0, r2, r0, r0, r0, r0, r3, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r4, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0xf8, 0x15}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r0, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000000)={@cgroup=r8, 0xc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1344.941499][ T27] 1 lock held by syz-executor.2/27422: [ 1344.956604][ T27] 1 lock held by syz-executor.0/27626: [ 1344.966274][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1345.015038][ T27] 2 locks held by syz-executor.3/28056: [ 1345.020623][ T27] 2 locks held by syz-executor.3/28407: [ 1345.033393][ T27] 2 locks held by syz-executor.2/28417: [ 1345.039047][ T27] 3 locks held by syz-executor.3/28418: [ 1345.053328][ T27] 2 locks held by syz-executor.3/28424: [ 1345.058905][ T27] 2 locks held by syz-executor.2/28428: [ 1345.098984][ T27] 1 lock held by syz-executor.1/28445: [ 1345.113575][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1345.123056][ T27] 2 locks held by syz-executor.2/28455: [ 1345.141525][ T27] 2 locks held by syz-executor.3/28456: [ 1345.156543][ T27] [ 1345.158992][ T27] ============================================= [ 1345.158992][ T27] [ 1345.175847][ T27] NMI backtrace for cpu 0 [ 1345.180210][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0 [ 1345.188315][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1345.198387][ T27] Call Trace: [ 1345.201679][ T27] [ 1345.204621][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1345.209322][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1345.214973][ T27] ? panic+0x84d/0x84d [ 1345.219069][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1345.224220][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1345.229186][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1345.234078][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1345.240253][ T27] ? _printk+0xd1/0x111 [ 1345.244429][ T27] ? panic+0x84d/0x84d [ 1345.248509][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1345.253372][ T27] ? panic+0x84d/0x84d [ 1345.257482][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1345.262521][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1345.268659][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1345.274663][ T27] watchdog+0xe72/0xeb0 [ 1345.278904][ T27] kthread+0x3f6/0x4f0 [ 1345.283011][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1345.288234][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1345.292846][ T27] ret_from_fork+0x1f/0x30 [ 1345.297295][ T27] [ 1345.300930][ T27] Sending NMI from CPU 0 to CPUs 1: [ 1345.306325][ C1] NMI backtrace for cpu 1 [ 1345.306336][ C1] CPU: 1 PID: 5361 Comm: kworker/u4:6 Not tainted 5.15.149-syzkaller #0 [ 1345.306353][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1345.306364][ C1] Workqueue: phy3 ieee80211_iface_work [ 1345.306458][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x60 [ 1345.306479][ C1] Code: 00 00 00 0f 1f 00 53 48 89 fb e8 17 00 00 00 48 8b 3d 88 86 63 0c 48 89 de 5b e9 87 e1 48 00 cc cc cc cc cc cc cc 48 8b 04 24 <65> 48 8b 0d d4 39 82 7e 65 8b 15 d5 39 82 7e f7 c2 00 01 ff 00 74 [ 1345.306493][ C1] RSP: 0018:ffffc9000e0af908 EFLAGS: 00000202 [ 1345.306506][ C1] RAX: ffffffff89b732ac RBX: 00000000000000b4 RCX: ffff88802399bb80 [ 1345.306519][ C1] RDX: 0000000000000000 RSI: 00000000000000f0 RDI: 00000000000000b4 [ 1345.306529][ C1] RBP: 00000000000000f0 R08: ffffffff89b73208 R09: fffffbfff1bc7746 [ 1345.306540][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 1345.306551][ C1] R13: dffffc0000000000 R14: ffff88807f023310 R15: 0000000000000007 [ 1345.306562][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1345.306576][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1345.306587][ C1] CR2: 00007f3a7eff21f8 CR3: 000000007d426000 CR4: 00000000003506e0 [ 1345.306601][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1345.306610][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1345.306620][ C1] Call Trace: [ 1345.306625][ C1] [ 1345.306630][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1345.306651][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1345.306675][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1345.306695][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 1345.306740][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1345.306757][ C1] ? nmi_handle+0xf7/0x370 [ 1345.306773][ C1] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 1345.306790][ C1] ? default_do_nmi+0x62/0x150 [ 1345.306807][ C1] ? exc_nmi+0xab/0x120 [ 1345.306839][ C1] ? end_repeat_nmi+0x16/0x31 [ 1345.306857][ C1] ? ieee80211_sta_get_rates+0x3b8/0x6b0 [ 1345.306888][ C1] ? ieee80211_sta_get_rates+0x45c/0x6b0 [ 1345.306907][ C1] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 1345.306925][ C1] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 1345.306943][ C1] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 1345.306961][ C1] [ 1345.306965][ C1] [ 1345.306970][ C1] ieee80211_sta_get_rates+0x45c/0x6b0 [ 1345.306994][ C1] ieee80211_ibss_rx_queued_mgmt+0xf6f/0x2af0 [ 1345.307042][ C1] ? mark_lock+0x98/0x340 [ 1345.307059][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1345.307081][ C1] ? ieee80211_ibss_rx_no_sta+0x720/0x720 [ 1345.307099][ C1] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1345.307119][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1345.307137][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1345.307155][ C1] ? _raw_spin_unlock+0x40/0x40 [ 1345.307175][ C1] ? kcov_remote_start+0x76/0x490 [ 1345.307194][ C1] ? kcov_remote_start+0xf9/0x490 [ 1345.307213][ C1] ieee80211_iface_work+0x78f/0xcc0 [ 1345.307236][ C1] process_one_work+0x8a1/0x10c0 [ 1345.307261][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1345.307281][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1345.307299][ C1] ? kthread_data+0x4e/0xc0 [ 1345.307315][ C1] ? wq_worker_running+0x97/0x170 [ 1345.307332][ C1] worker_thread+0xaca/0x1280 [ 1345.307350][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1345.307391][ C1] kthread+0x3f6/0x4f0 [ 1345.307405][ C1] ? rcu_lock_release+0x20/0x20 [ 1345.307421][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1345.307436][ C1] ret_from_fork+0x1f/0x30 [ 1345.307460][ C1] [ 1345.573482][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1345.671404][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0 [ 1345.679400][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1345.689469][ T27] Call Trace: [ 1345.692789][ T27] [ 1345.695731][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1345.700428][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1345.706072][ T27] ? panic+0x84d/0x84d [ 1345.710166][ T27] panic+0x318/0x84d [ 1345.714070][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1345.719723][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1345.725886][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1345.731093][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1345.737202][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1345.743370][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1345.749550][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1345.755730][ T27] watchdog+0xeb0/0xeb0 [ 1345.759918][ T27] kthread+0x3f6/0x4f0 [ 1345.764001][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1345.769041][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1345.773653][ T27] ret_from_fork+0x1f/0x30 [ 1345.778099][ T27] [ 1345.781379][ T27] Kernel Offset: disabled [ 1345.785708][ T27] Rebooting in 86400 seconds..