bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1375.067962][T19587] bridge0: port 1(bridge_slave_0) entered blocking state [ 1375.075170][T19587] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.092940][T19587] device bridge_slave_0 entered promiscuous mode [ 1375.109693][T19587] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.127519][T19587] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.136193][T19587] device bridge_slave_1 entered promiscuous mode 23:53:16 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1376.178830][T19554] team0: Port device team_slave_0 added 23:53:17 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1376.422014][T19587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1376.460107][T19587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1376.489349][T19554] team0: Port device team_slave_1 added 23:53:17 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:18 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:18 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:19 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:20 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:20 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1380.296152][T19554] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1380.317985][T19554] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1380.368588][T19554] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1380.401930][T19587] team0: Port device team_slave_0 added [ 1380.439003][T19554] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1380.457614][T19554] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1380.511708][T19554] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1380.530520][T19587] team0: Port device team_slave_1 added 23:53:22 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1381.740157][T19587] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1381.747615][T19587] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1381.787464][T19587] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1382.469058][T19587] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1382.476386][T19587] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1382.577502][T19587] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 23:53:23 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1383.213361][T19554] device hsr_slave_0 entered promiscuous mode [ 1383.308717][T19554] device hsr_slave_1 entered promiscuous mode [ 1383.366207][T19554] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1383.381815][T19554] Cannot create hsr debugfs directory 23:53:24 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:25 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xc0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1384.875505][T19587] device hsr_slave_0 entered promiscuous mode [ 1384.894673][T19587] device hsr_slave_1 entered promiscuous mode [ 1384.910697][T19587] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1384.927503][T19587] Cannot create hsr debugfs directory 23:53:26 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xc0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:26 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xc0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1385.857828][T16093] Bluetooth: hci5: command 0x0409 tx timeout 23:53:27 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r3]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:28 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r3]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1387.937750][ T7773] Bluetooth: hci5: command 0x041b tx timeout [ 1388.204380][T19554] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1388.365078][T19554] netdevsim netdevsim1 netdevsim1: renamed from eth1 23:53:29 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r3]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1388.490118][T19554] netdevsim netdevsim1 netdevsim2: renamed from eth2 23:53:30 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:30 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1389.918302][T19554] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1390.014535][T19948] chnl_net:caif_netlink_parms(): no params data found [ 1390.022337][T15514] Bluetooth: hci3: command 0x0409 tx timeout [ 1390.037386][T15514] Bluetooth: hci5: command 0x040f tx timeout 23:53:32 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1392.097515][T19270] Bluetooth: hci5: command 0x0419 tx timeout [ 1392.107966][T19270] Bluetooth: hci3: command 0x041b tx timeout 23:53:33 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1394.177646][T19270] Bluetooth: hci3: command 0x040f tx timeout 23:53:35 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:35 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:36 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, 0xffffffffffffffff, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:37 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, 0xffffffffffffffff, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1396.257764][ T7773] Bluetooth: hci3: command 0x0419 tx timeout 23:53:38 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, 0xffffffffffffffff, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:38 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:39 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:40 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:41 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:41 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:42 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:42 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1402.122226][T19948] bridge0: port 1(bridge_slave_0) entered blocking state [ 1402.133089][T19948] bridge0: port 1(bridge_slave_0) entered disabled state [ 1402.150306][T19948] device bridge_slave_0 entered promiscuous mode 23:53:43 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:44 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:45 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:46 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:46 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:47 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xc8, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1406.397796][T19948] bridge0: port 2(bridge_slave_1) entered blocking state [ 1406.405674][T19948] bridge0: port 2(bridge_slave_1) entered disabled state [ 1406.441718][T19948] device bridge_slave_1 entered promiscuous mode 23:53:47 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xc8, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1407.120632][T19948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1407.170290][T19554] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1407.183650][T19948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:53:48 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xc8, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1407.919466][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1407.928450][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1407.952294][T19554] 8021q: adding VLAN 0 to HW filter on device team0 [ 1408.000853][T19948] team0: Port device team_slave_0 added [ 1408.020218][T19948] team0: Port device team_slave_1 added [ 1408.048500][T19993] chnl_net:caif_netlink_parms(): no params data found 23:53:49 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x14, 0x1, 0x1, [r5]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:50 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x14, 0x1, 0x1, [r5]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1409.348560][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1409.367648][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1409.376185][ T7775] bridge0: port 1(bridge_slave_0) entered blocking state [ 1409.383306][ T7775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1409.427873][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1409.436774][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1409.477834][ T7775] bridge0: port 2(bridge_slave_1) entered blocking state [ 1409.484922][ T7775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1409.507844][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1409.517582][T19587] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1410.311134][T19948] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1410.327339][T19948] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1410.377344][T19948] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1410.409778][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1410.418084][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1410.427045][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1410.460243][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1410.469089][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1410.478429][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1410.487228][T19587] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1410.633663][T19948] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1410.647337][T19948] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1410.676099][T19948] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1410.687873][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1410.702483][T19587] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1410.896887][T19587] netdevsim netdevsim0 netdevsim3: renamed from eth3 23:53:52 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x14, 0x1, 0x1, [r5]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1411.015785][T19554] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1411.097600][T19554] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1411.149041][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1411.157865][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1411.166824][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1411.178077][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1411.186664][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:53:52 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:52 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:53:53 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1412.831674][T19993] bridge0: port 1(bridge_slave_0) entered blocking state [ 1412.847369][T19993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1412.855787][T19993] device bridge_slave_0 entered promiscuous mode [ 1413.041700][T19948] device hsr_slave_0 entered promiscuous mode [ 1413.155688][T19948] device hsr_slave_1 entered promiscuous mode 23:53:54 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1413.388284][T19948] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1413.407605][T19948] Cannot create hsr debugfs directory [ 1413.435564][T19993] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.443704][T19993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1413.463380][T19993] device bridge_slave_1 entered promiscuous mode 23:53:55 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1414.424097][T19993] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1414.470440][T19993] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:53:55 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1415.511529][T19993] team0: Port device team_slave_0 added [ 1415.529811][T19993] team0: Port device team_slave_1 added 23:53:56 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1415.844821][T19993] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1415.857755][T19993] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1415.907815][T19993] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 23:53:57 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1417.171805][T19993] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1417.187587][T19993] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1417.269204][T19993] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 23:53:59 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:00 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xa8, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:00 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xa8, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1420.737565][T16093] Bluetooth: hci0: command 0x0409 tx timeout [ 1421.041688][T19993] device hsr_slave_0 entered promiscuous mode 23:54:02 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xa8, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1421.472606][T19993] device hsr_slave_1 entered promiscuous mode [ 1421.947578][T19993] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1421.955171][T19993] Cannot create hsr debugfs directory 23:54:03 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1422.817524][T19274] Bluetooth: hci0: command 0x041b tx timeout [ 1423.059004][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.065438][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 23:54:04 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:05 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1424.417587][ T7775] Bluetooth: hci1: command 0x0409 tx timeout [ 1424.897721][T19271] Bluetooth: hci0: command 0x040f tx timeout 23:54:06 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:06 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:07 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1426.497755][ T7775] Bluetooth: hci1: command 0x041b tx timeout 23:54:07 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:07 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1426.854842][T20542] chnl_net:caif_netlink_parms(): no params data found [ 1426.977807][T19270] Bluetooth: hci0: command 0x0419 tx timeout 23:54:08 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1428.212707][T20542] bridge0: port 1(bridge_slave_0) entered blocking state [ 1428.227465][T20542] bridge0: port 1(bridge_slave_0) entered disabled state [ 1428.235944][T20542] device bridge_slave_0 entered promiscuous mode [ 1428.262242][T20473] chnl_net:caif_netlink_parms(): no params data found [ 1428.286750][T20542] bridge0: port 2(bridge_slave_1) entered blocking state [ 1428.297672][T20542] bridge0: port 2(bridge_slave_1) entered disabled state [ 1428.306078][T20542] device bridge_slave_1 entered promiscuous mode [ 1428.577695][ T7775] Bluetooth: hci1: command 0x040f tx timeout 23:54:10 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, 0xffffffffffffffff, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1429.382746][T19948] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1429.742978][T20542] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1429.793801][T19948] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1429.974043][T20542] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:54:11 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, 0xffffffffffffffff, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1430.316961][T19948] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1430.568768][T20473] bridge0: port 1(bridge_slave_0) entered blocking state [ 1430.575854][T20473] bridge0: port 1(bridge_slave_0) entered disabled state [ 1430.608983][T20473] device bridge_slave_0 entered promiscuous mode [ 1430.629962][T19948] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1430.657667][T19271] Bluetooth: hci1: command 0x0419 tx timeout [ 1430.944270][T19993] netdevsim netdevsim4 netdevsim0: renamed from eth0 23:54:12 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, 0xffffffffffffffff, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:12 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:14 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:15 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:16 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, 0xffffffffffffffff, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:17 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, 0xffffffffffffffff, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1436.549629][T20473] bridge0: port 2(bridge_slave_1) entered blocking state [ 1436.556930][T20473] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.575063][T20473] device bridge_slave_1 entered promiscuous mode [ 1436.597535][T19993] netdevsim netdevsim4 netdevsim1: renamed from eth1 23:54:17 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, 0xffffffffffffffff, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r11]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r12, r13, r14, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1436.782444][T20542] team0: Port device team_slave_0 added 23:54:18 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1437.491083][T19993] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1437.580474][T20542] team0: Port device team_slave_1 added [ 1437.589436][T20473] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1437.625434][T19993] netdevsim netdevsim4 netdevsim3: renamed from eth3 23:54:18 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:19 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:19 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, 0xffffffffffffffff, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1438.776408][T20473] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1439.025397][T20542] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1439.037475][T20542] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1439.065193][T20542] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 23:54:20 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, 0xffffffffffffffff, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1439.422912][T20542] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1439.430652][T20542] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1439.458664][T20542] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1439.502562][T20473] team0: Port device team_slave_0 added [ 1439.513465][T20473] team0: Port device team_slave_1 added 23:54:21 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, 0xffffffffffffffff, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:21 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1440.896839][T20473] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1440.910575][T20473] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1440.959871][T20473] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1441.041052][T20542] device hsr_slave_0 entered promiscuous mode 23:54:22 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1441.248394][T20542] device hsr_slave_1 entered promiscuous mode [ 1441.452801][T20542] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1441.467454][T20542] Cannot create hsr debugfs directory [ 1441.489070][T20473] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1441.496039][T20473] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1441.558221][T20473] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1441.762811][T19948] 8021q: adding VLAN 0 to HW filter on device bond0 23:54:22 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r9, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1442.028139][T19993] 8021q: adding VLAN 0 to HW filter on device bond0 23:54:23 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, 0xffffffffffffffff, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1442.834001][T20473] device hsr_slave_0 entered promiscuous mode [ 1442.947125][T20473] device hsr_slave_1 entered promiscuous mode 23:54:24 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, 0xffffffffffffffff, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1443.190453][T20473] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1443.208071][T20473] Cannot create hsr debugfs directory [ 1443.413998][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1443.428594][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1443.457242][T19993] 8021q: adding VLAN 0 to HW filter on device team0 [ 1443.484459][T19948] 8021q: adding VLAN 0 to HW filter on device team0 [ 1443.721087][T19270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1443.738270][T19270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:54:24 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, 0xffffffffffffffff, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1444.405477][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1444.420140][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1444.428700][T16093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1444.435765][T16093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1444.462725][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1444.471756][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1444.493884][T16093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1444.501031][T16093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1444.521796][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1444.797263][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1444.822154][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:54:26 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1445.686190][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1445.710766][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 23:54:27 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1447.023189][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1447.045762][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1447.090054][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1447.122024][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1447.147844][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 23:54:29 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r0, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1448.199525][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1448.229068][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1448.526746][T20892] chnl_net:caif_netlink_parms(): no params data found 23:54:29 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, 0xffffffffffffffff, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1449.238073][T19274] Bluetooth: hci4: command 0x0409 tx timeout 23:54:30 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, 0xffffffffffffffff, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:31 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, 0xffffffffffffffff, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1451.297651][T16093] Bluetooth: hci4: command 0x041b tx timeout 23:54:32 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:32 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:33 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r3, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:33 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, 0xffffffffffffffff, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1453.378022][T16093] Bluetooth: hci4: command 0x040f tx timeout 23:54:34 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, 0xffffffffffffffff, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:35 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, 0xffffffffffffffff, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:35 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:36 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1455.457539][T19271] Bluetooth: hci4: command 0x0419 tx timeout 23:54:37 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r2, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1456.097565][T16093] Bluetooth: hci3: command 0x0409 tx timeout 23:54:37 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, 0xffffffffffffffff, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1456.854690][T20892] bridge0: port 1(bridge_slave_0) entered blocking state [ 1456.862116][T20892] bridge0: port 1(bridge_slave_0) entered disabled state [ 1456.901844][T20892] device bridge_slave_0 entered promiscuous mode [ 1456.919605][T20892] bridge0: port 2(bridge_slave_1) entered blocking state [ 1456.930306][T20892] bridge0: port 2(bridge_slave_1) entered disabled state [ 1456.942434][T20892] device bridge_slave_1 entered promiscuous mode 23:54:38 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, 0xffffffffffffffff, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1457.849643][T20892] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1458.177563][T19271] Bluetooth: hci3: command 0x041b tx timeout [ 1458.234695][T20892] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1458.673310][T20892] team0: Port device team_slave_0 added [ 1458.692152][T20892] team0: Port device team_slave_1 added 23:54:40 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, 0xffffffffffffffff, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1459.489581][T20892] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1459.496550][T20892] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1459.587344][T20892] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1459.899862][T20892] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1459.906844][T20892] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1459.952468][T20892] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1460.257738][T19274] Bluetooth: hci3: command 0x040f tx timeout 23:54:41 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1460.724204][T20542] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1461.398631][T20542] netdevsim netdevsim0 netdevsim1: renamed from eth1 23:54:42 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:43 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r8, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1462.337544][T16093] Bluetooth: hci3: command 0x0419 tx timeout [ 1462.868658][T20542] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1463.221458][T20892] device hsr_slave_0 entered promiscuous mode 23:54:44 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, 0xffffffffffffffff, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1463.277331][T20892] device hsr_slave_1 entered promiscuous mode [ 1463.437474][T20892] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1463.445067][T20892] Cannot create hsr debugfs directory [ 1463.468399][T20542] netdevsim netdevsim0 netdevsim3: renamed from eth3 23:54:45 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, 0xffffffffffffffff, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:45 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, 0xffffffffffffffff, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:45 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:46 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1465.752755][T21097] chnl_net:caif_netlink_parms(): no params data found 23:54:47 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:48 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:48 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1467.625671][T21097] bridge0: port 1(bridge_slave_0) entered blocking state [ 1467.637499][T21097] bridge0: port 1(bridge_slave_0) entered disabled state [ 1467.645961][T21097] device bridge_slave_0 entered promiscuous mode [ 1467.690035][T21097] bridge0: port 2(bridge_slave_1) entered blocking state [ 1467.707751][T21097] bridge0: port 2(bridge_slave_1) entered disabled state [ 1467.716231][T21097] device bridge_slave_1 entered promiscuous mode 23:54:49 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1468.772265][T21097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:54:49 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xc0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1468.824054][T21097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1468.849000][T20542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1469.083995][T20473] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1469.096934][T21097] team0: Port device team_slave_0 added 23:54:50 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xc0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:51 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xc0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:52 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:52 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1472.249520][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1472.261011][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1472.282066][T20542] 8021q: adding VLAN 0 to HW filter on device team0 [ 1472.308174][T20473] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1472.573362][T21097] team0: Port device team_slave_1 added [ 1473.042723][T20473] netdevsim netdevsim1 netdevsim2: renamed from eth2 23:54:54 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1473.140654][T20473] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1473.707977][T21097] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1473.715071][T21097] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 23:54:54 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1473.772749][T21097] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1474.384812][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1474.393789][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1474.417929][T19274] bridge0: port 1(bridge_slave_0) entered blocking state [ 1474.425024][T19274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1474.447848][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1474.458581][T21097] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1474.465551][T21097] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1474.517393][T21097] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 23:54:55 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1474.563153][T19270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1474.575006][T19270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1474.586108][T19270] bridge0: port 2(bridge_slave_1) entered blocking state [ 1474.593350][T19270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1474.628692][T19270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1474.638288][T19270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1474.891982][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1474.904283][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1474.922519][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1474.938746][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1474.958256][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1474.967130][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1474.985533][T20542] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1475.008492][T20542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1475.220863][T21097] device hsr_slave_0 entered promiscuous mode 23:54:56 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1475.739546][T21097] device hsr_slave_1 entered promiscuous mode [ 1475.782391][T21097] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1475.797409][T21097] Cannot create hsr debugfs directory [ 1475.803073][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1475.819278][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1475.842714][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1475.948928][T20473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1476.756809][T20473] 8021q: adding VLAN 0 to HW filter on device team0 [ 1476.798157][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1476.806130][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1476.887227][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1476.899890][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1476.918054][ T7775] bridge0: port 1(bridge_slave_0) entered blocking state [ 1476.925192][ T7775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1476.947912][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1476.956879][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1476.988004][ T7775] bridge0: port 2(bridge_slave_1) entered blocking state [ 1476.995136][ T7775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1477.058554][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1477.066770][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1477.088774][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1477.098449][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1477.106064][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1477.127483][T20892] netdevsim netdevsim3 netdevsim0: renamed from eth0 23:54:58 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:54:58 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1477.823662][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1477.849156][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 23:54:59 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:00 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:00 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:01 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1480.501200][T20542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1480.517595][T20892] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1480.592969][T19274] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1480.618258][T20892] netdevsim netdevsim3 netdevsim2: renamed from eth2 23:55:01 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={0xffffffffffffffff, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1481.183455][T20892] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1481.200074][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1481.212608][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 23:55:02 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={0xffffffffffffffff, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:02 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={0xffffffffffffffff, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:03 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, 0xffffffffffffffff, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:03 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, 0xffffffffffffffff, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1483.575017][T20892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1483.608391][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1483.616572][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1483.643985][T20892] 8021q: adding VLAN 0 to HW filter on device team0 [ 1483.665875][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1483.676758][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1483.692333][T15497] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.699477][T15497] bridge0: port 1(bridge_slave_0) entered forwarding state 23:55:04 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, 0xffffffffffffffff, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1483.760955][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1483.769231][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1483.788127][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1483.796780][T15514] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.803886][T15514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1483.817770][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1483.826905][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1483.858656][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1483.878406][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1483.887196][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1483.908527][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1483.927342][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1483.937144][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1483.964510][T20892] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1483.998321][T20892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1484.009660][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1484.028172][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1484.038284][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1484.500516][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.506824][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 23:55:05 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x0, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1485.520581][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1485.531122][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1485.549850][T20892] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1485.679355][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1485.703134][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1485.803241][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1485.829496][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1485.860573][T21381] chnl_net:caif_netlink_parms(): no params data found [ 1485.883134][T20892] device veth0_vlan entered promiscuous mode [ 1485.908335][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1485.916335][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1486.035859][T20892] device veth1_vlan entered promiscuous mode 23:55:07 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x0, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1486.897761][T19274] Bluetooth: hci0: command 0x0409 tx timeout 23:55:08 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x0, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1487.663566][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1487.676932][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1487.708130][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1487.731713][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1487.768570][T21381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.775740][T21381] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.795941][T21381] device bridge_slave_0 entered promiscuous mode [ 1487.820090][T20892] device veth0_macvtap entered promiscuous mode [ 1487.854349][T21381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.862460][T21381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.871637][T21381] device bridge_slave_1 entered promiscuous mode [ 1487.883933][T20892] device veth1_macvtap entered promiscuous mode [ 1488.898145][T15514] Bluetooth: hci1: command 0x0409 tx timeout [ 1488.944447][T11039] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1488.957511][T21381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:55:10 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1488.987395][T19274] Bluetooth: hci0: command 0x041b tx timeout [ 1489.001034][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.047519][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.067455][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.087333][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.097175][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.117317][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.127157][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.139260][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.154500][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.177543][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.190055][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.207318][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.217148][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.247708][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.259494][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.273923][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.287313][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.307319][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.327325][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.338579][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.351884][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1489.378216][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.390443][T20892] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1489.416606][T21381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1489.437958][T15515] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1489.458120][T15515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1489.472570][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.498128][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.508367][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.538036][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.548304][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.563396][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.607590][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.639374][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.656267][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.687547][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.707363][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.727315][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.737150][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.767295][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.777139][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.797496][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.807664][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.827309][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.837149][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.857308][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.867158][T20892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1489.897313][T20892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1489.909420][T20892] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1489.979685][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1489.988848][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1490.408390][T21381] team0: Port device team_slave_0 added [ 1490.426519][T20892] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1490.441517][T20892] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1490.457397][T20892] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1490.481619][T20892] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1490.515629][T21381] team0: Port device team_slave_1 added 23:55:11 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1490.975739][T21097] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1490.997744][T19274] Bluetooth: hci1: command 0x041b tx timeout [ 1491.058016][T19271] Bluetooth: hci0: command 0x040f tx timeout [ 1491.250697][T21097] netdevsim netdevsim4 netdevsim1: renamed from eth1 23:55:12 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1491.732383][T21381] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1491.747419][T21381] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1491.797330][T21381] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1491.812514][T21395] chnl_net:caif_netlink_parms(): no params data found [ 1491.997675][T21097] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1492.124529][T21381] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1492.135646][T21381] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1492.179036][T21381] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1492.214977][T21097] netdevsim netdevsim4 netdevsim3: renamed from eth3 23:55:13 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1493.057561][T19271] Bluetooth: hci1: command 0x040f tx timeout 23:55:14 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1493.137802][T19271] Bluetooth: hci0: command 0x0419 tx timeout 23:55:14 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1494.701371][T21381] device hsr_slave_0 entered promiscuous mode [ 1494.823630][T21381] device hsr_slave_1 entered promiscuous mode 23:55:15 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={0xffffffffffffffff, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1495.107535][T21381] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1495.115128][T21381] Cannot create hsr debugfs directory [ 1495.137617][T19270] Bluetooth: hci1: command 0x0419 tx timeout 23:55:16 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={0xffffffffffffffff, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:17 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={0xffffffffffffffff, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1496.105551][T21395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1496.116938][T21395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1496.139034][T21395] device bridge_slave_0 entered promiscuous mode [ 1496.200706][T21395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1496.219101][T21395] bridge0: port 2(bridge_slave_1) entered disabled state [ 1496.238023][T21395] device bridge_slave_1 entered promiscuous mode 23:55:17 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1497.177632][ T1184] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1497.185714][ T1184] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1497.374595][T15497] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 23:55:18 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1497.945584][T21395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:55:19 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:20 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1499.314862][T21395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1499.575236][ T377] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1499.583703][ T377] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 23:55:20 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:21 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) [ 1501.118472][T19270] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1501.143976][T21395] team0: Port device team_slave_0 added 23:55:22 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1501.180441][T21097] 8021q: adding VLAN 0 to HW filter on device bond0 23:55:22 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:22 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:22 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:23 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1501.994147][T21395] team0: Port device team_slave_1 added 23:55:23 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:23 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:23 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:23 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:24 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1503.040507][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1503.053653][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:55:24 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:24 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1504.069325][T21395] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1504.076298][T21395] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1504.167362][T21395] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 23:55:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:25 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:26 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:26 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:27 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00), 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:27 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1507.029299][T21097] 8021q: adding VLAN 0 to HW filter on device team0 [ 1507.039603][T21395] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1507.046569][T21395] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1507.107524][T21395] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 23:55:28 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:28 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00), 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:28 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:29 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1508.836890][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1508.856268][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1508.864901][T16093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1508.872016][T16093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1508.911919][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1508.933508][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1508.954821][T16093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1508.961981][T16093] bridge0: port 2(bridge_slave_1) entered forwarding state 23:55:30 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:30 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00), 0x12) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f80)='syz1\x00', 0x1ff) 23:55:31 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1511.151298][T21395] device hsr_slave_0 entered promiscuous mode 23:55:32 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 23:55:32 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1512.193483][T21395] device hsr_slave_1 entered promiscuous mode 23:55:33 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1512.669280][T21395] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1512.676920][T21395] Cannot create hsr debugfs directory [ 1512.699570][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1512.712084][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1512.738852][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1512.752636][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1512.891959][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1512.901126][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1512.929782][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 23:55:34 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:34 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 23:55:34 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 23:55:35 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:36 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 23:55:36 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:37 executing program 2: socketpair(0x6, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r2}) r3 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_pressure(r2, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c103634cb01b92f2ed2a61feddeefe18f2521e69483fb238841f3a12c8d6115ea62f91c17ce185037403561cfabc049bb95b80feb32c170a0b18427f6ab478d177b9fc769e25cdb8c172a3ad214c6c193feaa9f3568e4d76353a3a85cb74875ae1d5b2e", 0x64}, {&(0x7f00000001c0)="065a136b5c566c6330b7d9dc5c0b3a452e6042e4eba5afd2e6ee33ab58e3f2ca3c6ea2918c92f7b6cff9e2c7111a4aea5925ba011a8e37fab5847d9cbb13145a0d28faba7e036b464e9cf6a4e5a3afcf291f3fb41c42c1d48ebc181401bf64430f7d7eb2cfddb5eacf3de4be15c8a97acc70ade2de6df6cad5b8377283e453aadb16bb0b4f0f660734a7f6d23d9d065cbedf0bb88feea399718420de3877a92ec72989bdc664a57572718dfca34e542587a00de35137e1205fada1604b5d61f0cd7dd90fea42362095cba29c64f65a5c93f02339e6128a3ecde3d466a4", 0xdd}], 0x2}, 0x1) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r3}, 0x18) r6 = gettid() r7 = syz_clone(0x13aa0400, &(0x7f0000000480)="0ea63d361520e8e735f26fde5507739121789d690640a41bcb1898a554d65cb98db166902ec710f89d0764f06cdc47d4cfbd8597203c8ec7026bf48d612ba8d794375427b81cb718863618fa7ebce5ef206c5cb802e4c661d4eaebef37a33e37af4e9fdb2d8893afe0830e7827a7dd324c9275f0863b75f19ffdd5c19a372be9f79d1cb6e28828e24214", 0x8a, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="3fc5eeea75ef7a7390444bf33589f36469") sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r4, r1, r3, r2, 0xffffffffffffffff, r5, r1]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}], 0x98}, 0x800) r8 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x200, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000700), 0xb}, 0x8000, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r6, 0xe, r2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) socketpair(0x28, 0x5, 0x3b, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x10, r8}, 0x18) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b80)={&(0x7f0000000b40)='consume_skb\x00', r2}, 0x10) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='gpio_direction\x00', r2}, 0x10) sendmsg$unix(r10, &(0x7f0000000d40)={&(0x7f0000000840)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)="0dd93c61f86d5969a96831ac7dde82b469859c958cb394f6256c7491061ce3f660ca7aa4f14b04318db518abc0c80a2ddf4e3375e4612706175bfd24faae9c7148876506987b50a75c1d3042bb06a8d6b2", 0x51}, {&(0x7f0000000940)="d101b1cfdb3ff92603ab42aeb6f05085aafbc0f2e6eeef0d0b3de75ffe8eb01729d68983fa59429da358ccd42a95ac8e16a0d6ed0813cd84c13a7ebf3ec4b9", 0x3f}], 0x2, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r8, r2, r3, r0, r9, r8, r3, r11, r2, r3]}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r1, r3, r12]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x34, 0x1, 0x1, [r4, r13, r14, r15, r2, r1, r5, r4, r9]}}], 0xe0, 0x24008000}, 0x24000000) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r2, 0x4, r2}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000dc0)={r2, r5}, 0xc) write$cgroup_int(r2, &(0x7f0000000e00)=0xc6, 0x12) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) [ 1516.257030][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1516.278694][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1516.297525][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 23:55:37 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:38 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:39 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:40 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:40 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:40 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:41 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1520.411637][T21381] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1520.540049][T21381] netdevsim netdevsim1 netdevsim1: renamed from eth1 23:55:41 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = gettid() r2 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1520.908170][T21381] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1521.035365][T21381] netdevsim netdevsim1 netdevsim3: renamed from eth3 23:55:42 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1521.338157][T21768] chnl_net:caif_netlink_parms(): no params data found [ 1521.366870][T21381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1521.650898][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1521.668408][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:55:42 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1521.701955][T21381] 8021q: adding VLAN 0 to HW filter on device team0 [ 1521.795017][T21768] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.807560][T21768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1521.847875][T21768] device bridge_slave_0 entered promiscuous mode [ 1521.888660][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1521.908080][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1521.947705][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.954798][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1522.015137][T21768] bridge0: port 2(bridge_slave_1) entered blocking state [ 1522.027644][T21768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1522.036265][T21768] device bridge_slave_1 entered promiscuous mode 23:55:43 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1522.337594][T19274] Bluetooth: hci2: command 0x0409 tx timeout [ 1522.369027][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1522.388039][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1522.396991][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1522.407983][ T7773] bridge0: port 2(bridge_slave_1) entered blocking state [ 1522.415065][ T7773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1522.433667][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1522.449420][T21395] netdevsim netdevsim0 netdevsim0: renamed from eth0 23:55:43 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:43 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) 23:55:43 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1523.219065][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1523.240316][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1523.254753][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1523.278130][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1523.318887][T16093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1523.330173][T21395] netdevsim netdevsim0 netdevsim1: renamed from eth1 23:55:44 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) [ 1523.371537][T21768] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1523.403319][T21768] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1523.448566][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1523.467597][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1523.476292][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1523.517738][T21395] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1523.543338][T21381] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1523.568392][T21381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:55:44 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1523.928079][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1523.936860][T19271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1523.968922][T21395] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1524.178352][T16093] Bluetooth: hci3: command 0x0409 tx timeout [ 1524.208843][T21768] team0: Port device team_slave_0 added 23:55:45 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1524.341074][T21768] team0: Port device team_slave_1 added [ 1524.417759][T19271] Bluetooth: hci2: command 0x041b tx timeout 23:55:45 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:55:46 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0, 0x0, 0x8}, 0x18) 23:55:46 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0, 0x0, 0x8}, 0x18) 23:55:47 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0, 0x0, 0x8}, 0x18) [ 1526.257540][ T7773] Bluetooth: hci3: command 0x041b tx timeout [ 1526.316825][T21768] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1526.347306][T21768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1526.417296][T21768] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1526.497482][ T13] Bluetooth: hci2: command 0x040f tx timeout [ 1526.625221][T21768] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1526.634341][T21768] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 23:55:47 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00'}, 0x18) [ 1526.678580][T21768] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1526.707739][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1526.715505][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1526.793277][T21381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1526.890638][T21768] device hsr_slave_0 entered promiscuous mode [ 1526.908458][T21768] device hsr_slave_1 entered promiscuous mode [ 1526.927955][T21768] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1526.935548][T21768] Cannot create hsr debugfs directory 23:55:48 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00'}, 0x18) 23:55:48 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00'}, 0x18) [ 1528.337598][ T7775] Bluetooth: hci3: command 0x040f tx timeout 23:55:49 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1528.577469][ T7775] Bluetooth: hci2: command 0x0419 tx timeout 23:55:51 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1530.417607][ T13] Bluetooth: hci3: command 0x0419 tx timeout 23:55:51 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1530.826634][T21395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1530.848046][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1530.868073][T15514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1530.905191][T21381] device veth0_vlan entered promiscuous mode [ 1531.736845][T21395] 8021q: adding VLAN 0 to HW filter on device team0 [ 1531.769159][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1531.788211][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1531.797015][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1531.818292][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1531.834234][T21381] device veth1_vlan entered promiscuous mode [ 1532.012400][ T154] device hsr_slave_0 left promiscuous mode [ 1532.166043][ T154] device hsr_slave_1 left promiscuous mode 23:55:53 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) [ 1532.257961][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1532.600060][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1532.669794][ T154] device bridge_slave_1 left promiscuous mode [ 1532.676608][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.826693][ T154] device bridge_slave_0 left promiscuous mode [ 1532.837629][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1533.257643][ T154] device hsr_slave_0 left promiscuous mode 23:55:54 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) [ 1533.507796][ T154] device hsr_slave_1 left promiscuous mode 23:55:54 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) [ 1533.806351][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1534.030763][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1534.202768][ T154] device bridge_slave_1 left promiscuous mode [ 1534.217431][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 23:55:55 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) [ 1534.385447][ T154] device bridge_slave_0 left promiscuous mode [ 1534.397498][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:55:56 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) [ 1535.397675][ T154] device hsr_slave_0 left promiscuous mode [ 1535.637886][ T154] device hsr_slave_1 left promiscuous mode 23:55:56 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) [ 1535.950268][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1536.258944][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1536.355143][ T154] device bridge_slave_1 left promiscuous mode [ 1536.367588][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1536.741980][ T154] device bridge_slave_0 left promiscuous mode [ 1536.751723][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1536.874747][ T154] device hsr_slave_0 left promiscuous mode [ 1536.889982][ T154] device hsr_slave_1 left promiscuous mode [ 1536.969273][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1536.987515][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1537.120204][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1537.137500][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 23:55:58 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1537.234297][ T154] device bridge_slave_1 left promiscuous mode [ 1537.259074][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1537.613066][ T154] device bridge_slave_0 left promiscuous mode [ 1537.657708][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1538.315048][ T154] device hsr_slave_0 left promiscuous mode [ 1538.425722][ T154] device hsr_slave_1 left promiscuous mode 23:55:59 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1538.562462][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1538.574820][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1538.760103][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1538.777698][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1538.960939][ T154] device bridge_slave_1 left promiscuous mode [ 1538.967198][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.142913][ T154] device bridge_slave_0 left promiscuous mode [ 1539.151735][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:00 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1540.058807][ T154] device hsr_slave_0 left promiscuous mode [ 1540.391007][ T154] device hsr_slave_1 left promiscuous mode 23:56:01 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1541.137853][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1541.147773][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1541.190659][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1541.199855][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1541.238454][ T154] device bridge_slave_1 left promiscuous mode [ 1541.244675][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:02 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1542.158220][ T154] device bridge_slave_0 left promiscuous mode [ 1542.164466][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:03 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1543.034276][ T154] device hsr_slave_0 left promiscuous mode [ 1543.190341][ T154] device hsr_slave_1 left promiscuous mode 23:56:04 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1543.447709][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1543.455299][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1543.633772][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1543.647817][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1543.704636][ T154] device bridge_slave_1 left promiscuous mode [ 1543.715490][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.843058][ T154] device bridge_slave_0 left promiscuous mode [ 1543.850077][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:05 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:05 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:06 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1545.340142][ T154] device hsr_slave_0 left promiscuous mode 23:56:06 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1545.780170][ T154] device hsr_slave_1 left promiscuous mode [ 1545.938713][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.945064][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 [ 1546.045206][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1546.059504][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1546.126256][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1546.139045][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1546.214578][ T154] device bridge_slave_1 left promiscuous mode [ 1546.226726][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1546.573585][ T154] device bridge_slave_0 left promiscuous mode [ 1546.587392][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:07 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:08 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1547.732519][ T154] device hsr_slave_0 left promiscuous mode [ 1547.907421][ T154] device hsr_slave_1 left promiscuous mode 23:56:09 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1548.396156][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1548.459846][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1548.668079][ T154] device bridge_slave_1 left promiscuous mode [ 1548.674306][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.862224][ T154] device bridge_slave_0 left promiscuous mode [ 1548.868523][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1549.517542][ T154] device hsr_slave_0 left promiscuous mode 23:56:10 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1549.789005][ T154] device hsr_slave_1 left promiscuous mode [ 1550.366626][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1550.411631][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 23:56:11 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1550.469402][ T154] device bridge_slave_1 left promiscuous mode [ 1550.475610][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1550.938120][ T154] device bridge_slave_0 left promiscuous mode [ 1550.944352][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:12 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:12 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1551.887645][ T154] device hsr_slave_0 left promiscuous mode [ 1551.950594][ T154] device hsr_slave_1 left promiscuous mode [ 1552.245583][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 23:56:13 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1552.456539][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1552.904709][ T154] device bridge_slave_1 left promiscuous mode [ 1552.915582][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:14 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1553.057482][ T7773] Bluetooth: hci5: command 0x0409 tx timeout 23:56:14 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1553.868740][ T154] device bridge_slave_0 left promiscuous mode [ 1553.875341][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:15 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1554.899084][T11039] Bluetooth: hci6: command 0x0409 tx timeout [ 1554.998756][ T154] device hsr_slave_0 left promiscuous mode [ 1555.137575][ T13] Bluetooth: hci5: command 0x041b tx timeout 23:56:16 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1555.605989][ T154] device hsr_slave_1 left promiscuous mode [ 1555.804116][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1555.878148][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 23:56:17 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1556.125605][ T154] device bridge_slave_1 left promiscuous mode [ 1556.137450][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1556.860263][ T154] device bridge_slave_0 left promiscuous mode [ 1556.866594][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1556.978029][ T7773] Bluetooth: hci6: command 0x041b tx timeout [ 1556.995757][ T154] device hsr_slave_0 left promiscuous mode [ 1557.008394][ T154] device hsr_slave_1 left promiscuous mode [ 1557.027840][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1557.217760][ T7773] Bluetooth: hci5: command 0x040f tx timeout [ 1557.225321][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1557.309872][ T154] device bridge_slave_1 left promiscuous mode [ 1557.327502][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1557.335986][ T154] device bridge_slave_0 left promiscuous mode [ 1557.351402][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:18 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1557.385316][ T154] device hsr_slave_0 left promiscuous mode [ 1557.397914][ T154] device hsr_slave_1 left promiscuous mode [ 1557.467491][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1557.480170][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1557.517883][ T154] device bridge_slave_1 left promiscuous mode [ 1557.524126][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1557.549577][ T154] device bridge_slave_0 left promiscuous mode [ 1557.555907][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1557.583317][ T154] device hsr_slave_0 left promiscuous mode [ 1557.597641][ T154] device hsr_slave_1 left promiscuous mode [ 1557.604214][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1557.612524][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1557.641633][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1557.657510][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1557.668183][ T154] device bridge_slave_1 left promiscuous mode [ 1557.674377][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1557.868011][ T154] device bridge_slave_0 left promiscuous mode [ 1557.874232][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1558.086609][ T154] device hsr_slave_0 left promiscuous mode 23:56:19 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1558.261450][ T154] device hsr_slave_1 left promiscuous mode [ 1558.631525][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 23:56:19 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1558.838650][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1558.999850][ T154] device bridge_slave_1 left promiscuous mode [ 1559.006116][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1559.057955][ T13] Bluetooth: hci6: command 0x040f tx timeout [ 1559.209499][ T154] device bridge_slave_0 left promiscuous mode [ 1559.215759][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1559.297681][ T13] Bluetooth: hci5: command 0x0419 tx timeout 23:56:20 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1559.898788][ T154] device hsr_slave_0 left promiscuous mode [ 1560.057525][ T154] device hsr_slave_1 left promiscuous mode 23:56:21 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1560.377711][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1560.586476][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1560.647052][ T154] device bridge_slave_1 left promiscuous mode [ 1560.658969][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1560.753221][ T154] device bridge_slave_0 left promiscuous mode [ 1560.763560][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:21 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1561.137962][ T13] Bluetooth: hci6: command 0x0419 tx timeout [ 1561.248899][ T154] device hsr_slave_0 left promiscuous mode [ 1561.257734][ T154] device hsr_slave_1 left promiscuous mode 23:56:22 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={0x0, 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1561.647799][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1561.658731][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 23:56:22 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={0x0, 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1561.807047][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1561.819708][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1562.028385][ T154] device bridge_slave_1 left promiscuous mode [ 1562.034610][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1562.548740][ T154] device bridge_slave_0 left promiscuous mode [ 1562.554994][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:23 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={0x0, 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1563.259025][ T154] device hsr_slave_0 left promiscuous mode [ 1563.392915][ T154] device hsr_slave_1 left promiscuous mode 23:56:24 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1563.737552][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1563.745223][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1563.874407][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1563.887631][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1564.060249][ T154] device bridge_slave_1 left promiscuous mode [ 1564.066500][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1564.088513][ T154] device bridge_slave_0 left promiscuous mode [ 1564.094734][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1564.128529][ T154] device hsr_slave_0 left promiscuous mode [ 1564.138353][ T154] device hsr_slave_1 left promiscuous mode [ 1564.210377][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1564.218204][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1564.263553][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1564.277595][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1564.333611][ T154] device bridge_slave_1 left promiscuous mode [ 1564.347436][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1564.456694][ T154] device bridge_slave_0 left promiscuous mode [ 1564.463023][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1565.636527][ T154] device veth1_macvtap left promiscuous mode [ 1565.645225][ T154] device veth0_macvtap left promiscuous mode [ 1565.660564][ T154] device veth1_vlan left promiscuous mode [ 1565.666653][ T154] device veth0_vlan left promiscuous mode 23:56:28 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1568.137494][ T154] device veth1_macvtap left promiscuous mode [ 1568.143616][ T154] device veth0_macvtap left promiscuous mode [ 1568.157367][ T154] device veth1_vlan left promiscuous mode [ 1568.163216][ T154] device veth0_vlan left promiscuous mode 23:56:29 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:30 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1569.437567][ T154] device veth1_macvtap left promiscuous mode [ 1569.443632][ T154] device veth0_macvtap left promiscuous mode [ 1569.457373][ T154] device veth1_vlan left promiscuous mode [ 1569.463208][ T154] device veth0_vlan left promiscuous mode 23:56:30 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x0, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:31 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x0, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1570.877621][ T154] device veth1_macvtap left promiscuous mode [ 1570.883726][ T154] device veth0_macvtap left promiscuous mode [ 1570.900638][ T154] device veth1_vlan left promiscuous mode [ 1570.906466][ T154] device veth0_vlan left promiscuous mode 23:56:32 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x0, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:33 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1572.100996][ T154] device veth1_macvtap left promiscuous mode [ 1572.107068][ T154] device veth0_macvtap left promiscuous mode [ 1572.134938][ T154] device veth1_vlan left promiscuous mode [ 1572.147647][ T154] device veth0_vlan left promiscuous mode 23:56:33 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1573.218326][ T154] device veth1_macvtap left promiscuous mode [ 1573.227573][ T154] device veth0_macvtap left promiscuous mode [ 1573.233676][ T154] device veth1_vlan left promiscuous mode [ 1573.267611][ T154] device veth0_vlan left promiscuous mode [ 1573.617787][ T7773] Bluetooth: hci4: command 0x0406 tx timeout 23:56:34 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1573.808858][ T154] device veth1_macvtap left promiscuous mode [ 1573.814948][ T154] device veth0_macvtap left promiscuous mode [ 1573.837866][ T154] device veth1_vlan left promiscuous mode [ 1573.843707][ T154] device veth0_vlan left promiscuous mode [ 1574.467251][ T154] device veth1_macvtap left promiscuous mode [ 1574.477507][ T154] device veth0_macvtap left promiscuous mode [ 1574.483601][ T154] device veth1_vlan left promiscuous mode [ 1574.501010][ T154] device veth0_vlan left promiscuous mode 23:56:35 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:36 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1575.573044][ T154] device veth1_macvtap left promiscuous mode [ 1575.590212][ T154] device veth0_macvtap left promiscuous mode [ 1575.596327][ T154] device veth1_vlan left promiscuous mode [ 1575.627635][ T154] device veth0_vlan left promiscuous mode 23:56:36 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:37 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1576.607829][ T154] device veth1_macvtap left promiscuous mode [ 1576.613895][ T154] device veth0_macvtap left promiscuous mode [ 1576.637517][ T154] device veth1_vlan left promiscuous mode [ 1576.643350][ T154] device veth0_vlan left promiscuous mode 23:56:38 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:39 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:41 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:42 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:42 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:42 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:43 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:44 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:45 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:45 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:46 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:47 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:48 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:49 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1588.337510][T11039] Bluetooth: hci7: command 0x0409 tx timeout 23:56:49 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:50 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:51 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1590.177406][ T13] Bluetooth: hci8: command 0x0409 tx timeout [ 1590.417610][ T13] Bluetooth: hci7: command 0x041b tx timeout 23:56:51 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:52 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1592.257345][T16093] Bluetooth: hci8: command 0x041b tx timeout 23:56:53 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1592.497620][T16093] Bluetooth: hci7: command 0x040f tx timeout 23:56:54 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:54 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1594.337548][ T7773] Bluetooth: hci8: command 0x040f tx timeout 23:56:55 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1594.577650][ T7773] Bluetooth: hci7: command 0x0419 tx timeout 23:56:56 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1596.417590][T16093] Bluetooth: hci8: command 0x0419 tx timeout 23:56:57 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:58 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:59 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:56:59 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:01 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:01 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x0, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:02 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x0, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:03 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x0, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:04 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x0, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:05 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x0, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:06 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x0, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:07 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:08 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1607.379495][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.385819][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 23:57:08 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:10 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:10 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1609.457812][ T7773] Bluetooth: hci0: command 0x0406 tx timeout [ 1609.464053][ T7773] Bluetooth: hci1: command 0x0406 tx timeout 23:57:11 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:11 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:12 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:13 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:14 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:14 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:15 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:16 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:18 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:18 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:19 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1619.307443][T11039] Bluetooth: hci9: command 0x0409 tx timeout 23:57:20 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:20 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:21 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1621.067442][T11039] Bluetooth: hci10: command 0x0409 tx timeout [ 1621.379131][T15515] Bluetooth: hci9: command 0x041b tx timeout 23:57:22 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:23 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:23 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1623.147730][ T1066] Bluetooth: hci10: command 0x041b tx timeout [ 1623.457628][T15515] Bluetooth: hci9: command 0x040f tx timeout 23:57:24 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1625.217441][T11039] Bluetooth: hci10: command 0x040f tx timeout 23:57:26 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1625.537460][T11039] Bluetooth: hci9: command 0x0419 tx timeout 23:57:27 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:27 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1627.308197][T11039] Bluetooth: hci10: command 0x0419 tx timeout 23:57:28 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:29 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:30 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:30 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1629.819546][ T154] team0 (unregistering): Port device team_slave_1 removed 23:57:30 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1630.536347][ T154] team0 (unregistering): Port device team_slave_0 removed 23:57:31 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1631.049975][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 23:57:32 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1631.453692][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 23:57:32 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:33 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1632.876975][ T154] bond0 (unregistering): Released all slaves 23:57:35 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:36 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1636.549325][ T154] team0 (unregistering): Port device team_slave_1 removed 23:57:37 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1636.768841][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1637.217885][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 23:57:38 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:38 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:39 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1638.361342][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 23:57:39 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:40 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:41 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1640.910244][ T154] bond0 (unregistering): Released all slaves 23:57:42 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:42 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1642.995635][ T154] team0 (unregistering): Port device team_slave_1 removed 23:57:44 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1643.728223][ T154] team0 (unregistering): Port device team_slave_0 removed 23:57:45 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1644.501477][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 23:57:46 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1644.979696][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1645.297517][T16093] Bluetooth: hci2: command 0x0406 tx timeout [ 1645.304774][T16093] Bluetooth: hci3: command 0x0406 tx timeout 23:57:46 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:46 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:47 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:47 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:48 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:48 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1647.874107][ T154] bond0 (unregistering): Released all slaves 23:57:49 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:50 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:51 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:51 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:57:52 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1652.010038][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1652.551473][ T154] team0 (unregistering): Port device team_slave_0 removed 23:57:54 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1652.923528][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1652.959462][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 23:57:54 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) 23:57:55 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) [ 1654.318311][ T154] bond0 (unregistering): Released all slaves [ 1654.497401][ T7773] Bluetooth: hci11: command 0x0409 tx timeout 23:57:56 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) 23:57:56 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) 23:57:57 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) [ 1656.507397][T15515] Bluetooth: hci12: command 0x0409 tx timeout [ 1656.577517][T16093] Bluetooth: hci11: command 0x041b tx timeout 23:57:58 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) 23:57:59 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1658.582733][T16093] Bluetooth: hci12: command 0x041b tx timeout [ 1658.657618][T16093] Bluetooth: hci11: command 0x040f tx timeout 23:57:59 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:00 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:01 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:01 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1660.638404][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1660.657478][T16093] Bluetooth: hci12: command 0x040f tx timeout [ 1660.737463][T16093] Bluetooth: hci11: command 0x0419 tx timeout 23:58:02 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1661.168776][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1661.541111][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1661.782251][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 23:58:02 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:03 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1662.737663][ T7773] Bluetooth: hci12: command 0x0419 tx timeout [ 1663.259999][ T154] bond0 (unregistering): Released all slaves 23:58:05 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:05 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:06 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:06 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:07 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:08 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:09 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1668.058392][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1668.818589][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.825053][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 [ 1669.310380][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1669.791299][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 23:58:10 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1670.468134][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 23:58:11 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:12 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:12 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1672.265669][ T154] bond0 (unregistering): Released all slaves 23:58:13 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:13 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:14 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:15 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:15 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:16 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1676.017821][ T7773] Bluetooth: hci5: command 0x0406 tx timeout [ 1676.023890][ T7773] Bluetooth: hci6: command 0x0406 tx timeout 23:58:17 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1677.088525][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1677.392670][ T154] team0 (unregistering): Port device team_slave_0 removed 23:58:18 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1677.822068][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1677.858503][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1678.398182][ T154] bond0 (unregistering): Released all slaves 23:58:20 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 23:58:22 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1682.257802][ T27] INFO: task kworker/1:3:3563 blocked for more than 143 seconds. [ 1682.265860][ T27] Not tainted 5.15.149-syzkaller #0 [ 1682.283668][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1682.301598][ T27] task:kworker/1:3 state:D stack:23832 pid: 3563 ppid: 2 flags:0x00004000 [ 1682.321344][ T27] Workqueue: ipv6_addrconf addrconf_dad_work [ 1682.335773][ T27] Call Trace: [ 1682.347221][ T27] [ 1682.350210][ T27] __schedule+0x12c4/0x45b0 23:58:23 executing program 3: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() r0 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1682.354977][ T27] ? mark_lock+0x98/0x340 [ 1682.369886][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1682.375979][ T27] ? __sched_text_start+0x8/0x8 [ 1682.387229][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1682.397444][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1682.402681][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1682.417240][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1682.422544][ T27] schedule+0x11b/0x1f0 [ 1682.426706][ T27] schedule_preempt_disabled+0xf/0x20 [ 1682.447286][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1682.452546][ T27] ? addrconf_dad_work+0xcc/0x1720 [ 1682.458079][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1682.463317][ T27] mutex_lock_nested+0x17/0x20 [ 1682.477240][ T27] addrconf_dad_work+0xcc/0x1720 [ 1682.482226][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1682.488186][ T27] ? rcu_lock_release+0x20/0x20 [ 1682.493070][ T27] ? print_irqtrace_events+0x210/0x210 [ 1682.507235][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1682.513231][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1682.527242][ T27] process_one_work+0x8a1/0x10c0 [ 1682.532340][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1682.540420][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1682.545995][ T27] ? kthread_data+0x4e/0xc0 [ 1682.557237][ T27] ? wq_worker_running+0x97/0x170 [ 1682.562311][ T27] worker_thread+0xaca/0x1280 [ 1682.567015][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1682.585997][ T27] kthread+0x3f6/0x4f0 [ 1682.590911][ T27] ? rcu_lock_release+0x20/0x20 [ 1682.595784][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1682.607253][ T27] ret_from_fork+0x1f/0x30 [ 1682.611761][ T27] [ 1682.614941][ T27] INFO: task kworker/0:18:7775 blocked for more than 143 seconds. [ 1682.627225][ T27] Not tainted 5.15.149-syzkaller #0 [ 1682.633064][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1682.666894][ T27] task:kworker/0:18 state:D stack:24632 pid: 7775 ppid: 2 flags:0x00004000 [ 1682.678339][ T27] Workqueue: events switchdev_deferred_process_work [ 1682.685042][ T27] Call Trace: [ 1682.689632][ T27] [ 1682.692597][ T27] __schedule+0x12c4/0x45b0 [ 1682.697122][ T27] ? mark_lock+0x98/0x340 [ 1682.717252][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1682.723375][ T27] ? __sched_text_start+0x8/0x8 [ 1682.728844][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1682.734331][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1682.747235][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1682.752480][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1682.758158][ T27] schedule+0x11b/0x1f0 [ 1682.762326][ T27] schedule_preempt_disabled+0xf/0x20 [ 1682.777242][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1682.782510][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1682.794719][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1682.807235][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1682.813397][ T27] ? print_irqtrace_events+0x210/0x210 [ 1682.827238][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1682.833365][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1682.847267][ T27] mutex_lock_nested+0x17/0x20 [ 1682.852084][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1682.867253][ T27] process_one_work+0x8a1/0x10c0 [ 1682.872252][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1682.880326][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1682.885895][ T27] ? kthread_data+0x4e/0xc0 [ 1682.907685][ T27] ? wq_worker_running+0x97/0x170 [ 1682.912942][ T27] worker_thread+0xaca/0x1280 [ 1682.918123][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1682.924056][ T27] kthread+0x3f6/0x4f0 [ 1682.937234][ T27] ? rcu_lock_release+0x20/0x20 [ 1682.942121][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1682.946725][ T27] ret_from_fork+0x1f/0x30 [ 1682.957244][ T27] [ 1682.960300][ T27] INFO: task kworker/1:26:15514 blocked for more than 144 seconds. [ 1682.977245][ T27] Not tainted 5.15.149-syzkaller #0 [ 1682.983002][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1682.997226][ T27] task:kworker/1:26 state:D stack:24992 pid:15514 ppid: 2 flags:0x00004000 [ 1683.027275][ T27] Workqueue: events linkwatch_event [ 1683.032633][ T27] Call Trace: [ 1683.035969][ T27] [ 1683.057446][ T27] __schedule+0x12c4/0x45b0 [ 1683.062007][ T27] ? mark_lock+0x98/0x340 [ 1683.066364][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1683.097234][ T27] ? __sched_text_start+0x8/0x8 [ 1683.102311][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1683.117223][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1683.122466][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1683.141012][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1683.146261][ T27] schedule+0x11b/0x1f0 [ 1683.167293][ T27] schedule_preempt_disabled+0xf/0x20 [ 1683.172723][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1683.187231][ T27] ? linkwatch_event+0xa/0x50 [ 1683.191958][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1683.207233][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1683.213259][ T27] ? print_irqtrace_events+0x210/0x210 [ 1683.237244][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1683.243192][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1683.257230][ T27] mutex_lock_nested+0x17/0x20 [ 1683.262041][ T27] linkwatch_event+0xa/0x50 [ 1683.266558][ T27] process_one_work+0x8a1/0x10c0 [ 1683.278600][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1683.284289][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1683.303714][ T27] ? kthread_data+0x4e/0xc0 [ 1683.308981][ T27] ? wq_worker_running+0x97/0x170 [ 1683.315790][ T27] worker_thread+0xaca/0x1280 [ 1683.323081][ T27] kthread+0x3f6/0x4f0 [ 1683.334654][ T27] ? rcu_lock_release+0x20/0x20 [ 1683.347917][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1683.367496][ T27] ret_from_fork+0x1f/0x30 [ 1683.372099][ T27] [ 1683.375240][ T27] INFO: task kworker/0:27:19271 blocked for more than 144 seconds. [ 1683.397325][ T27] Not tainted 5.15.149-syzkaller #0 [ 1683.403076][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1683.427312][ T27] task:kworker/0:27 state:D stack:24952 pid:19271 ppid: 2 flags:0x00004000 [ 1683.436569][ T27] Workqueue: ipv6_addrconf addrconf_dad_work [ 1683.457450][ T27] Call Trace: [ 1683.460775][ T27] [ 1683.463713][ T27] __schedule+0x12c4/0x45b0 [ 1683.477263][ T27] ? mark_lock+0x98/0x340 [ 1683.481654][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1683.497245][ T27] ? __sched_text_start+0x8/0x8 [ 1683.502135][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1683.517245][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1683.522487][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1683.537241][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1683.542686][ T27] schedule+0x11b/0x1f0 [ 1683.546869][ T27] schedule_preempt_disabled+0xf/0x20 [ 1683.554910][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1683.567259][ T27] ? addrconf_dad_work+0xcc/0x1720 [ 1683.572420][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1683.587255][ T27] mutex_lock_nested+0x17/0x20 [ 1683.592059][ T27] addrconf_dad_work+0xcc/0x1720 [ 1683.597002][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1683.607232][ T27] ? rcu_lock_release+0x20/0x20 [ 1683.612276][ T27] ? print_irqtrace_events+0x210/0x210 [ 1683.627241][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1683.633189][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1683.638876][ T27] process_one_work+0x8a1/0x10c0 [ 1683.643850][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1683.657229][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1683.662814][ T27] ? kthread_data+0x4e/0xc0 [ 1683.669606][ T27] ? wq_worker_running+0x97/0x170 [ 1683.677474][ T27] worker_thread+0xaca/0x1280 [ 1683.682281][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1683.698410][ T27] kthread+0x3f6/0x4f0 [ 1683.702526][ T27] ? rcu_lock_release+0x20/0x20 [ 1683.717278][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1683.721931][ T27] ret_from_fork+0x1f/0x30 [ 1683.726379][ T27] [ 1683.737356][ T27] INFO: task syz-executor.1:21381 blocked for more than 144 seconds. [ 1683.745578][ T27] Not tainted 5.15.149-syzkaller #0 [ 1683.757225][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1683.765924][ T27] task:syz-executor.1 state:D stack:21080 pid:21381 ppid: 1 flags:0x00004006 [ 1683.777287][ T27] Call Trace: [ 1683.780624][ T27] [ 1683.783566][ T27] __schedule+0x12c4/0x45b0 [ 1683.797251][ T27] ? __sched_text_start+0x8/0x8 [ 1683.802147][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1683.808117][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1683.813348][ T27] schedule+0x11b/0x1f0 [ 1683.818586][ T27] schedule_preempt_disabled+0xf/0x20 [ 1683.823984][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1683.877353][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1683.882536][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1683.913643][ T27] mutex_lock_nested+0x17/0x20 [ 1683.930068][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1683.935394][ T27] ? rtnetlink_bind+0x80/0x80 [ 1683.940967][ T27] ? __local_bh_enable_ip+0x164/0x1f0 [ 1683.946435][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1683.952064][ T27] ? __local_bh_enable_ip+0x164/0x1f0 [ 1683.958075][ T27] ? local_bh_enable+0x5/0x20 [ 1683.962874][ T27] ? _local_bh_enable+0xa0/0xa0 [ 1683.968417][ T27] ? __dev_queue_xmit+0x1c56/0x3230 [ 1683.973653][ T27] ? __copy_skb_header+0x47b/0x600 [ 1683.979333][ T27] ? dev_queue_xmit+0x20/0x20 [ 1683.984027][ T27] ? memcpy+0x3c/0x60 [ 1683.997488][ T27] ? __copy_skb_header+0x47b/0x600 [ 1684.002664][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1684.009735][ T27] ? rtnetlink_bind+0x80/0x80 [ 1684.014458][ T27] ? netlink_ack+0xb10/0xb10 [ 1684.019679][ T27] netlink_unicast+0x7b6/0x980 [ 1684.024484][ T27] ? netlink_detachskb+0x90/0x90 23:58:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={0x0, 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1684.037274][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1684.042525][ T27] ? 0xffffffff81000000 [ 1684.046834][ T27] ? __check_object_size+0x300/0x410 [ 1684.052719][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1684.073649][ T27] netlink_sendmsg+0xa30/0xd60 [ 1684.087253][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1684.092508][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1684.098421][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1684.103731][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1684.109761][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1684.114980][ T27] __sys_sendto+0x564/0x720 [ 1684.122018][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1684.127870][ T27] ? print_irqtrace_events+0x210/0x210 [ 1684.133347][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1684.147248][ T27] __x64_sys_sendto+0xda/0xf0 [ 1684.151982][ T27] do_syscall_64+0x3d/0xb0 [ 1684.156406][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1684.164499][ T27] RIP: 0033:0x7f088b823a9c [ 1684.177238][ T27] RSP: 002b:00007fff41eb10e0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1684.185701][ T27] RAX: ffffffffffffffda RBX: 00007f088c478620 RCX: 00007f088b823a9c [ 1684.195314][ T27] RDX: 0000000000000028 RSI: 00007f088c478670 RDI: 0000000000000003 [ 1684.207227][ T27] RBP: 0000000000000000 R08: 00007fff41eb1134 R09: 000000000000000c [ 1684.215233][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1684.229335][ T27] R13: 0000000000000000 R14: 00007f088c478670 R15: 0000000000000000 [ 1684.247252][ T27] [ 1684.250409][ T27] INFO: task syz-executor.0:21395 blocked for more than 145 seconds. [ 1684.267239][ T27] Not tainted 5.15.149-syzkaller #0 [ 1684.272995][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1684.282155][ T27] task:syz-executor.0 state:D stack:21088 pid:21395 ppid: 1 flags:0x00004006 [ 1684.297236][ T27] Call Trace: [ 1684.300551][ T27] [ 1684.303491][ T27] __schedule+0x12c4/0x45b0 [ 1684.314781][ T27] ? __sched_text_start+0x8/0x8 [ 1684.327002][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1684.332912][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1684.338552][ T27] schedule+0x11b/0x1f0 [ 1684.342817][ T27] schedule_preempt_disabled+0xf/0x20 [ 1684.357244][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1684.362550][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1684.370211][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1684.375457][ T27] mutex_lock_nested+0x17/0x20 [ 1684.387243][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1684.392227][ T27] ? reacquire_held_locks+0x660/0x660 [ 1684.407254][ T27] ? rtnetlink_bind+0x80/0x80 [ 1684.412000][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1684.417119][ T27] ? __kernel_text_address+0x94/0x100 [ 1684.427119][ T27] ? unwind_get_return_address+0x49/0x80 [ 1684.435714][ T27] ? reacquire_held_locks+0x660/0x660 [ 1684.444983][ T27] ? arch_stack_walk+0xf3/0x140 [ 1684.452539][ T27] ? mark_lock+0x98/0x340 [ 1684.456906][ T27] ? mark_lock+0x98/0x340 [ 1684.466919][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1684.474626][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1684.483229][ T27] ? rtnetlink_bind+0x80/0x80 [ 1684.490506][ T27] ? netlink_ack+0xb10/0xb10 [ 1684.495142][ T27] netlink_unicast+0x7b6/0x980 [ 1684.505007][ T27] ? netlink_detachskb+0x90/0x90 [ 1684.512621][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1684.520382][ T27] ? 0xffffffff81000000 [ 1684.524566][ T27] ? __check_object_size+0x300/0x410 [ 1684.534802][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1684.542684][ T27] netlink_sendmsg+0xa30/0xd60 [ 1684.550036][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1684.555271][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1684.565171][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1684.574905][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1684.583044][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1684.590868][ T27] __sys_sendto+0x564/0x720 [ 1684.595408][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1684.606892][ T27] ? print_irqtrace_events+0x210/0x210 [ 1684.615075][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1684.622684][ T27] __x64_sys_sendto+0xda/0xf0 [ 1684.630014][ T27] do_syscall_64+0x3d/0xb0 [ 1684.634583][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1684.645554][ T27] RIP: 0033:0x7f3fee41ca9c 23:58:25 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={0x0, 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1684.652673][ T27] RSP: 002b:00007ffce1511100 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1684.666150][ T27] RAX: ffffffffffffffda RBX: 00007f3fef071620 RCX: 00007f3fee41ca9c [ 1684.689071][ T27] RDX: 0000000000000028 RSI: 00007f3fef071670 RDI: 0000000000000003 [ 1684.697091][ T27] RBP: 0000000000000000 R08: 00007ffce1511154 R09: 000000000000000c [ 1684.727240][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1684.735259][ T27] R13: 0000000000000000 R14: 00007f3fef071670 R15: 0000000000000000 [ 1684.751781][ T27] [ 1684.754921][ T27] INFO: task syz-executor.4:21768 blocked for more than 145 seconds. [ 1684.764744][ T27] Not tainted 5.15.149-syzkaller #0 [ 1684.777227][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1684.785927][ T27] task:syz-executor.4 state:D stack:21624 pid:21768 ppid: 1 flags:0x00004006 [ 1684.809130][ T27] Call Trace: [ 1684.812456][ T27] [ 1684.815403][ T27] __schedule+0x12c4/0x45b0 [ 1684.820996][ T27] ? __sched_text_start+0x8/0x8 [ 1684.825873][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1684.837237][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1684.842705][ T27] schedule+0x11b/0x1f0 [ 1684.846906][ T27] schedule_preempt_disabled+0xf/0x20 [ 1684.857250][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1684.862509][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1684.877244][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1684.882505][ T27] mutex_lock_nested+0x17/0x20 [ 1684.889425][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1684.894399][ T27] ? reacquire_held_locks+0x660/0x660 [ 1684.907246][ T27] ? rtnetlink_bind+0x80/0x80 [ 1684.911967][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1684.917005][ T27] ? __kernel_text_address+0x94/0x100 [ 1684.927231][ T27] ? unwind_get_return_address+0x49/0x80 [ 1684.937719][ T27] ? reacquire_held_locks+0x660/0x660 [ 1684.950254][ T27] ? arch_stack_walk+0xf3/0x140 [ 1684.967337][ T27] ? mark_lock+0x98/0x340 [ 1684.971724][ T27] ? mark_lock+0x98/0x340 [ 1684.997245][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1685.002349][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1685.007130][ T27] ? rtnetlink_bind+0x80/0x80 [ 1685.029122][ T27] ? netlink_ack+0xb10/0xb10 [ 1685.033865][ T27] netlink_unicast+0x7b6/0x980 [ 1685.047234][ T27] ? netlink_detachskb+0x90/0x90 [ 1685.052225][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1685.067260][ T27] ? 0xffffffff81000000 [ 1685.071537][ T27] ? __check_object_size+0x300/0x410 [ 1685.076833][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1685.107244][ T27] netlink_sendmsg+0xa30/0xd60 [ 1685.112071][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1685.127554][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1685.132634][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1685.157254][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1685.162764][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1685.177254][ T27] __sys_sendto+0x564/0x720 [ 1685.181819][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1685.197265][ T27] ? print_irqtrace_events+0x210/0x210 [ 1685.202771][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1685.217363][ T27] __x64_sys_sendto+0xda/0xf0 [ 1685.222396][ T27] do_syscall_64+0x3d/0xb0 [ 1685.226842][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1685.242151][ T27] RIP: 0033:0x7f04ab9aaa9c [ 1685.246652][ T27] RSP: 002b:00007fff5cd17a80 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1685.267868][ T27] RAX: ffffffffffffffda RBX: 00007f04ac5ff620 RCX: 00007f04ab9aaa9c [ 1685.275972][ T27] RDX: 0000000000000050 RSI: 00007f04ac5ff670 RDI: 0000000000000003 [ 1685.287801][ T27] RBP: 0000000000000000 R08: 00007fff5cd17ad4 R09: 000000000000000c [ 1685.297054][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1685.307252][ T27] R13: 0000000000000000 R14: 00007f04ac5ff670 R15: 0000000000000000 [ 1685.317837][ T27] [ 1685.320976][ T27] INFO: task syz-executor.2:21787 blocked for more than 146 seconds. [ 1685.330341][ T27] Not tainted 5.15.149-syzkaller #0 [ 1685.336593][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1685.345735][ T27] task:syz-executor.2 state:D stack:21624 pid:21787 ppid: 1 flags:0x00004006 [ 1685.355516][ T27] Call Trace: [ 1685.360328][ T27] [ 1685.363281][ T27] __schedule+0x12c4/0x45b0 [ 1685.369082][ T27] ? __sched_text_start+0x8/0x8 [ 1685.374138][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1685.377484][ T13] Bluetooth: hci13: command 0x0409 tx timeout [ 1685.380302][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1685.390933][ T27] schedule+0x11b/0x1f0 [ 1685.395117][ T27] schedule_preempt_disabled+0xf/0x20 [ 1685.404571][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1685.412473][ T27] ? rtnl_newlink+0xae9/0x2070 [ 1685.419921][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1685.425165][ T27] ? nla_strscpy+0xf9/0x170 [ 1685.434860][ T27] ? memset+0x1f/0x40 [ 1685.440518][ T27] mutex_lock_nested+0x17/0x20 [ 1685.445310][ T27] rtnl_newlink+0xae9/0x2070 [ 1685.454867][ T27] ? rtnl_newlink+0x6f1/0x2070 [ 1685.462883][ T27] ? rtnl_newlink+0x4f1/0x2070 [ 1685.470469][ T27] ? rtnl_newlink+0x4f1/0x2070 [ 1685.475272][ T27] ? rtnl_setlink+0x540/0x540 [ 1685.485703][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 1685.493420][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1685.501225][ T27] ? rtnl_setlink+0x540/0x540 [ 1685.505927][ T27] rtnetlink_rcv_msg+0x993/0xee0 [ 1685.514774][ T27] ? reacquire_held_locks+0x660/0x660 [ 1685.522829][ T27] ? rtnetlink_bind+0x80/0x80 [ 1685.530136][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1685.535187][ T27] ? __kernel_text_address+0x94/0x100 [ 1685.545733][ T27] ? unwind_get_return_address+0x49/0x80 [ 1685.554061][ T27] ? reacquire_held_locks+0x660/0x660 [ 1685.562283][ T27] ? arch_stack_walk+0xf3/0x140 [ 1685.567212][ T27] ? mark_lock+0x98/0x340 [ 1685.574099][ T27] ? mark_lock+0x98/0x340 [ 1685.583617][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1685.591975][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1685.596777][ T27] ? rtnetlink_bind+0x80/0x80 [ 1685.606501][ T27] ? netlink_ack+0xb10/0xb10 [ 1685.612684][ T27] netlink_unicast+0x7b6/0x980 [ 1685.620302][ T27] ? netlink_detachskb+0x90/0x90 [ 1685.625275][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1685.635355][ T27] ? 0xffffffff81000000 [ 1685.641077][ T27] ? __check_object_size+0x300/0x410 [ 1685.646388][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1685.656451][ T27] netlink_sendmsg+0xa30/0xd60 [ 1685.664752][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1685.672682][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1685.680313][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1685.685632][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1685.697455][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1685.702768][ T27] __sys_sendto+0x564/0x720 [ 1685.712926][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1685.720984][ T27] ? print_irqtrace_events+0x210/0x210 [ 1685.726482][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1685.735378][ T27] __x64_sys_sendto+0xda/0xf0 [ 1685.742743][ T27] do_syscall_64+0x3d/0xb0 [ 1685.750094][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1685.756125][ T27] RIP: 0033:0x7f1b214c2a9c [ 1685.766104][ T27] RSP: 002b:00007ffdd42fec40 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1685.779552][ T27] RAX: ffffffffffffffda RBX: 00007f1b22117620 RCX: 00007f1b214c2a9c [ 1685.799374][ T27] RDX: 000000000000003c RSI: 00007f1b22117670 RDI: 0000000000000003 [ 1685.813623][ T27] RBP: 0000000000000000 R08: 00007ffdd42fec94 R09: 000000000000000c [ 1685.827224][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1685.835234][ T27] R13: 0000000000000000 R14: 00007f1b22117670 R15: 0000000000000000 [ 1685.847256][ T27] [ 1685.852255][ T27] [ 1685.852255][ T27] Showing all locks held in the system: [ 1685.867230][ T27] 1 lock held by khungtaskd/27: [ 1685.872120][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1685.887232][ T27] 6 locks held by kworker/u4:1/144: [ 1685.892469][ T27] 5 locks held by kworker/u4:2/154: [ 1685.898201][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1685.918581][ T27] #1: ffffc90001db7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1685.937249][ T27] #2: ffffffff8d9cff10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1685.946628][ T27] #3: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1685.967285][ T27] #4: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1685.978688][ T27] 2 locks held by getty/3261: [ 1685.983379][ T27] #0: ffff8880243fb098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1686.007308][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1686.018234][ T27] 3 locks held by kworker/1:3/3563: 23:58:27 executing program 3: r0 = openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={0x0, 0x0, 0x10, r0}, 0x18) gettid() r1 = syz_clone(0x13aa0400, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000580), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x2, 0x3, 0x1, 0x2, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 1686.023450][ T27] #0: ffff888023813538 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1686.043774][ T27] #1: ffffc90002ff7d20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1686.077940][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xcc/0x1720 [ 1686.097243][ T27] 2 locks held by kworker/0:16/7773: [ 1686.102570][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1686.113536][ T27] #1: ffffc900050cfd20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1686.138545][ T27] 3 locks held by kworker/0:18/7775: [ 1686.143871][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1686.154735][ T27] #1: ffffc9000511fd20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1686.166367][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1686.178395][ T27] 3 locks held by kworker/1:9/15497: [ 1686.183710][ T27] #0: ffff888011c71938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1686.207409][ T27] #1: ffffc90003db7d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1686.218268][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1686.228380][ T27] 3 locks held by kworker/1:26/15514: [ 1686.233768][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1686.258925][ T27] #1: ffffc900034a7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1686.270314][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1686.280010][ T27] 3 locks held by kworker/0:27/19271: [ 1686.285395][ T27] #0: ffff888023813538 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1686.307390][ T27] #1: ffffc90003b47d20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1686.327233][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xcc/0x1720 [ 1686.336767][ T27] 1 lock held by syz-executor.1/21381: [ 1686.342792][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.357231][ T27] 1 lock held by syz-executor.0/21395: [ 1686.362732][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.384562][ T27] 1 lock held by syz-executor.4/21768: [ 1686.391084][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.400911][ T27] 1 lock held by syz-executor.2/21787: [ 1686.406378][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_newlink+0xae9/0x2070 [ 1686.427402][ T27] 1 lock held by syz-executor.1/22243: [ 1686.432888][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.447228][ T27] 1 lock held by syz-executor.0/22258: [ 1686.452701][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.467221][ T27] 1 lock held by syz-executor.4/22632: [ 1686.472707][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.495812][ T27] 1 lock held by syz-executor.2/22670: [ 1686.502936][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.512700][ T27] 1 lock held by syz-executor.1/22918: [ 1686.522227][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.537219][ T27] 1 lock held by syz-executor.0/23026: [ 1686.542701][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.557224][ T27] 1 lock held by syz-executor.4/23343: [ 1686.562728][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.577218][ T27] 1 lock held by syz-executor.2/23354: [ 1686.583003][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.597221][ T27] 1 lock held by syz-executor.3/23390: [ 1686.602722][ T27] #0: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1686.617215][ T27] 3 locks held by syz-executor.3/23394: [ 1686.622808][ T27] 2 locks held by syz-executor.3/23406: [ 1686.637234][ T27] 2 locks held by syz-executor.3/23409: [ 1686.642808][ T27] 2 locks held by syz-executor.3/23500: [ 1686.648895][ T27] 2 locks held by syz-executor.3/23503: [ 1686.654460][ T27] 2 locks held by syz-executor.3/23507: [ 1686.660446][ T27] 2 locks held by syz-executor.3/23511: [ 1686.665993][ T27] 3 locks held by syz-executor.3/23514: [ 1686.677299][ T27] 2 locks held by syz-executor.3/23517: [ 1686.683166][ T27] 2 locks held by syz-executor.3/23544: [ 1686.697249][ T27] 2 locks held by syz-executor.3/23547: [ 1686.702885][ T27] 2 locks held by syz-executor.3/23551: [ 1686.710233][ T27] 3 locks held by syz-executor.3/23554: [ 1686.715795][ T27] 2 locks held by syz-executor.3/23559: [ 1686.722448][ T27] 2 locks held by syz-executor.3/23562: [ 1686.728401][ T27] 3 locks held by syz-executor.3/23566: [ 1686.733960][ T27] 2 locks held by syz-executor.3/23569: [ 1686.747240][ T27] 2 locks held by syz-executor.3/23630: [ 1686.752826][ T27] 3 locks held by syz-executor.3/23633: [ 1686.767239][ T27] 2 locks held by syz-executor.3/23752: [ 1686.772901][ T27] 1 lock held by syz-executor.1/23763: [ 1686.778939][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.807435][ T27] 1 lock held by syz-executor.0/23773: [ 1686.812932][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1686.847883][ T27] 1 lock held by syz-executor.3/23795: [ 1686.853404][ T27] 1 lock held by syz-executor.3/23796: [ 1686.867317][ T27] [ 1686.869676][ T27] ============================================= [ 1686.869676][ T27] [ 1686.897493][ T27] NMI backtrace for cpu 1 [ 1686.901853][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0 [ 1686.909842][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1686.919918][ T27] Call Trace: [ 1686.923209][ T27] [ 1686.926143][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1686.930908][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1686.936595][ T27] ? panic+0x84d/0x84d [ 1686.940672][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1686.945872][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1686.950823][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1686.955715][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1686.961873][ T27] ? _printk+0xd1/0x111 [ 1686.966041][ T27] ? panic+0x84d/0x84d [ 1686.970122][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1686.974978][ T27] ? panic+0x84d/0x84d [ 1686.979052][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1686.984082][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1686.990230][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1686.996228][ T27] watchdog+0xe72/0xeb0 [ 1687.000461][ T27] kthread+0x3f6/0x4f0 [ 1687.004541][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1687.009571][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1687.014169][ T27] ret_from_fork+0x1f/0x30 [ 1687.018603][ T27] [ 1687.022322][ T27] Sending NMI from CPU 1 to CPUs 0: [ 1687.027784][ C0] NMI backtrace for cpu 0 [ 1687.027796][ C0] CPU: 0 PID: 8820 Comm: kworker/u4:9 Not tainted 5.15.149-syzkaller #0 [ 1687.027812][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1687.027821][ C0] Workqueue: 0x0 (phy59) [ 1687.027842][ C0] RIP: 0010:__list_del_entry_valid+0x2f/0x120 [ 1687.027937][ C0] Code: 54 53 49 89 fe 49 bc 00 00 00 00 00 fc ff df 48 83 c7 08 48 89 f8 48 c1 e8 03 42 80 3c 20 00 74 05 e8 a5 fd bd fd 4d 8b 7e 08 <4c> 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 8b fd bd fd [ 1687.027949][ C0] RSP: 0018:ffffc900080ffdb0 EFLAGS: 00000046 [ 1687.027961][ C0] RAX: 1ffff11008346921 RBX: ffff888011c7986c RCX: ffff888014f8bb80 [ 1687.027973][ C0] RDX: ffff888041a34968 RSI: 0000000000000004 RDI: ffff888041a34908 [ 1687.027983][ C0] RBP: dffffc0000000000 R08: ffffffff8153ef24 R09: 0000000000000003 [ 1687.027993][ C0] R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000 [ 1687.028005][ C0] R13: ffff888041a34900 R14: ffff888041a34900 R15: ffff888011c79870 [ 1687.028016][ C0] FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1687.028029][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1687.028039][ C0] CR2: 000000001fffff00 CR3: 0000000088542000 CR4: 00000000003506f0 [ 1687.028052][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1687.028061][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1687.028070][ C0] Call Trace: [ 1687.028075][ C0] [ 1687.028080][ C0] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1687.028098][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1687.028114][ C0] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1687.028132][ C0] ? unknown_nmi_error+0xd0/0xd0 [ 1687.028207][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1687.028222][ C0] ? nmi_handle+0xf7/0x370 [ 1687.028237][ C0] ? __list_del_entry_valid+0x2f/0x120 [ 1687.028252][ C0] ? default_do_nmi+0x62/0x150 [ 1687.028268][ C0] ? exc_nmi+0xab/0x120 [ 1687.028281][ C0] ? end_repeat_nmi+0x16/0x31 [ 1687.028296][ C0] ? worker_thread+0x1a4/0x1280 [ 1687.028313][ C0] ? __list_del_entry_valid+0x2f/0x120 [ 1687.028328][ C0] ? __list_del_entry_valid+0x2f/0x120 [ 1687.028344][ C0] ? __list_del_entry_valid+0x2f/0x120 [ 1687.028359][ C0] [ 1687.028363][ C0] [ 1687.028369][ C0] worker_thread+0x224/0x1280 [ 1687.028394][ C0] kthread+0x3f6/0x4f0 [ 1687.028407][ C0] ? rcu_lock_release+0x20/0x20 [ 1687.028421][ C0] ? kthread_blkcg+0xd0/0xd0 [ 1687.028435][ C0] ret_from_fork+0x1f/0x30 [ 1687.028458][ C0] [ 1687.119909][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1687.119926][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0 [ 1687.119946][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1687.119956][ T27] Call Trace: [ 1687.119963][ T27] [ 1687.119970][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1687.120000][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1687.120021][ T27] ? panic+0x84d/0x84d [ 1687.120047][ T27] panic+0x318/0x84d [ 1687.120065][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1687.120083][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1687.120106][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1687.120125][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1687.120147][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1687.120165][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1687.120186][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1687.120207][ T27] watchdog+0xeb0/0xeb0 [ 1687.120233][ T27] kthread+0x3f6/0x4f0 [ 1687.120250][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1687.120267][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1687.120284][ T27] ret_from_fork+0x1f/0x30 [ 1687.120313][ T27] [ 1687.120483][ T27] Kernel Offset: disabled [ 1687.411743][ T27] Rebooting in 86400 seconds..