YBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x0, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:51:54 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x0, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:51:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x4, 0x0, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:51:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x4, 0x0, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 980.886901][T25714] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 980.901763][T25714] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 980.961437][T25714] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 980.985497][T25733] team0: Port device team_slave_0 added [ 981.002139][T25744] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 981.046750][T25733] team0: Port device team_slave_1 added [ 981.064217][T25744] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:51:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x4, 0x0, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:51:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x4, 0xf}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:51:58 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x4, 0xf}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 983.172925][T25714] device hsr_slave_0 entered promiscuous mode [ 983.375703][T25714] device hsr_slave_1 entered promiscuous mode [ 983.511639][T25714] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 983.519228][T25714] Cannot create hsr debugfs directory 02:51:58 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x1, 0x2, 0x9}, {0x0, 0x4, 0xf}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 984.076024][T25733] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 984.091097][T25733] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 984.142535][T25733] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 984.165426][T25744] team0: Port device team_slave_0 added [ 984.196227][T25744] team0: Port device team_slave_1 added 02:51:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 984.431735][ T1066] Bluetooth: hci4: command 0x0409 tx timeout [ 984.725553][T25733] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 984.738962][T25733] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 02:52:00 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 984.783438][T25733] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 985.158418][T25744] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 985.176341][T25744] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 985.221858][T25744] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 985.250748][T25569] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 985.510961][T25744] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 985.523788][T25744] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 985.567095][T25744] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:52:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x0, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 986.080719][T25569] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 986.453907][T25569] netdevsim netdevsim5 netdevsim2: renamed from eth2 02:52:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x0, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 986.511618][ T3647] Bluetooth: hci4: command 0x041b tx timeout [ 986.951148][T25733] device hsr_slave_0 entered promiscuous mode 02:52:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x0, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 987.007276][T25733] device hsr_slave_1 entered promiscuous mode [ 987.263220][T25733] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 987.281460][T25733] Cannot create hsr debugfs directory [ 987.289126][T25569] netdevsim netdevsim5 netdevsim3: renamed from eth3 02:52:03 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0x0, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 988.591663][ T3596] Bluetooth: hci4: command 0x040f tx timeout 02:52:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0x0, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 990.065804][T25744] device hsr_slave_0 entered promiscuous mode [ 990.182263][T25744] device hsr_slave_1 entered promiscuous mode [ 990.253209][T25744] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 990.260797][T25744] Cannot create hsr debugfs directory 02:52:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0x0, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 990.662687][ T1066] Bluetooth: hci4: command 0x0419 tx timeout 02:52:06 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:07 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:07 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 992.833860][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.840160][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 02:52:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 994.122150][T25569] 8021q: adding VLAN 0 to HW filter on device bond0 02:52:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x0, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 995.344541][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 995.353218][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 995.378387][T25569] 8021q: adding VLAN 0 to HW filter on device team0 [ 995.399876][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 995.410701][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 995.423862][T22042] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.430925][T22042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 995.447677][T26053] chnl_net:caif_netlink_parms(): no params data found [ 995.474101][T22048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 995.482786][T22048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 995.494330][T22048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 995.505190][T22048] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.512315][T22048] bridge0: port 2(bridge_slave_1) entered forwarding state 02:52:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x0, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 995.524130][T22048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 995.925318][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 995.934893][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 995.954587][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 02:52:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x0, 0x5, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 995.992379][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 996.002460][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 996.022692][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 996.031295][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 996.064961][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 996.112346][T22042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 996.187124][T25569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 996.197574][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 02:52:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 998.302284][T26053] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.309380][T26053] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.335123][T26053] device bridge_slave_0 entered promiscuous mode [ 998.361644][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 998.369231][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 998.380191][T26053] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.387713][T26053] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.402683][T26053] device bridge_slave_1 entered promiscuous mode [ 998.413679][T25569] 8021q: adding VLAN 0 to HW filter on device batadv0 02:52:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x0, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1000.164783][T26053] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 02:52:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x0, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1000.207294][T26053] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1000.445956][T26053] team0: Port device team_slave_0 added [ 1000.473039][T26053] team0: Port device team_slave_1 added [ 1001.191565][T26053] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1001.211776][T26053] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1001.265969][T26053] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:52:17 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x0, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1002.075888][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1002.107130][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1002.132947][T26053] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1002.139905][T26053] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1002.201413][T26053] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:52:18 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1002.705933][T25714] netdevsim netdevsim3 netdevsim0: renamed from eth0 02:52:18 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1004.034235][T25714] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1004.058601][T26053] device hsr_slave_0 entered promiscuous mode [ 1004.072604][T26053] device hsr_slave_1 entered promiscuous mode [ 1004.086172][T26053] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1004.099744][T26053] Cannot create hsr debugfs directory [ 1004.120733][T25714] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1004.134279][T25714] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1004.172421][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1004.180982][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1004.202830][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1004.210747][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 02:52:19 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1004.595837][T25569] device veth0_vlan entered promiscuous mode 02:52:20 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:22 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x0, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1006.980905][T25569] device veth1_vlan entered promiscuous mode 02:52:23 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x0, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:24 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x0, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1009.157210][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1009.182383][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1009.209051][T25569] device veth0_macvtap entered promiscuous mode [ 1009.252347][T25714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1009.260207][T25569] device veth1_macvtap entered promiscuous mode [ 1009.294863][T25714] 8021q: adding VLAN 0 to HW filter on device team0 [ 1009.319632][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1009.341489][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.361431][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1009.372269][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.391369][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1009.402264][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.421467][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1009.432341][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.442557][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1009.461354][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.471186][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1009.501370][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.511248][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1009.541354][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.562687][T25569] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1009.570945][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1009.582125][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1009.590260][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1009.612139][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1009.620075][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1009.642268][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1009.664143][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1009.683049][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1009.692036][ T1066] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.699092][ T1066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1009.712002][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1009.720746][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1009.731761][ T1066] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.738818][ T1066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1009.751745][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1009.774779][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1009.788713][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.799000][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1009.821474][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.831298][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1009.842189][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.861361][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 02:52:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1009.874118][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.920358][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1009.941763][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1009.961374][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1009.981359][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1010.011564][T25569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1010.031371][T25569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1010.053936][T25569] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1010.082119][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1010.090396][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1010.122623][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1010.131868][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1010.140781][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1010.153053][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1010.171794][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1010.181137][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1010.204069][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1010.212462][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1010.221056][ T3596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1010.247762][T25714] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1010.281820][T25714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1010.301638][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1010.322905][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 02:52:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:26 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1011.498478][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1011.522396][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1011.534777][T25714] 8021q: adding VLAN 0 to HW filter on device batadv0 02:52:27 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x0, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1012.093077][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1012.102550][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1012.116741][T25714] device veth0_vlan entered promiscuous mode [ 1012.137698][T25714] device veth1_vlan entered promiscuous mode [ 1012.162689][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1012.171092][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1012.192334][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1012.227730][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1012.237466][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1012.247338][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1012.260553][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1012.272155][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1012.283349][T25714] device veth0_macvtap entered promiscuous mode [ 1012.301993][T25714] device veth1_macvtap entered promiscuous mode [ 1012.311688][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1012.322249][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1012.339083][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.381427][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.391283][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.431626][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.451425][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.471377][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.491396][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.513058][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.531371][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.542343][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.562177][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.582169][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.592181][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.602728][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.612604][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1012.641535][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.654898][T25714] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1012.665383][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1012.675034][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1012.701277][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.721976][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.734142][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.751476][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.771686][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.782820][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.801395][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.812398][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.832037][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.847242][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.861428][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.881376][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.891250][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.911396][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.921230][T25714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1012.941367][T25714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1012.954888][T25714] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1012.979245][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1012.989772][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1013.001866][T25714] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.010569][T25714] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.031427][T25714] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.040379][T25714] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 02:52:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x0, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x0, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:29 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1015.440044][T26053] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1015.461744][T19790] Bluetooth: hci0: command 0x0409 tx timeout 02:52:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:31 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1016.324358][T26053] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.450346][T26053] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.492156][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1016.500343][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1017.551706][ T1066] Bluetooth: hci0: command 0x041b tx timeout 02:52:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1018.969621][T26053] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 02:52:34 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1019.621696][ T1281] Bluetooth: hci0: command 0x040f tx timeout 02:52:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x0, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x0, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1020.922310][ T3584] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 02:52:36 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x0, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1021.711785][ T3596] Bluetooth: hci0: command 0x0419 tx timeout 02:52:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x0, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x0, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1023.312281][T26478] chnl_net:caif_netlink_parms(): no params data found 02:52:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x0, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x0, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x0, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1025.140873][T26478] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.162124][T26478] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.170404][T26478] device bridge_slave_0 entered promiscuous mode [ 1025.193670][T26478] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.200750][T26478] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.222719][T26478] device bridge_slave_1 entered promiscuous mode 02:52:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x0, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1025.912427][T26478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 02:52:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1026.339430][T26478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1026.581562][T19790] Bluetooth: hci2: command 0x0409 tx timeout 02:52:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1027.416982][T26478] team0: Port device team_slave_0 added [ 1027.435710][T26478] team0: Port device team_slave_1 added 02:52:43 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1028.663375][ T3584] Bluetooth: hci2: command 0x041b tx timeout [ 1028.798542][T26478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1028.806162][T26478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1028.861531][T26478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1028.894037][T26478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1028.900999][T26478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1028.961668][T26478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:52:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1030.111499][ T3584] Bluetooth: hci6: command 0x0409 tx timeout [ 1030.255287][T26671] chnl_net:caif_netlink_parms(): no params data found [ 1030.334470][T26478] device hsr_slave_0 entered promiscuous mode [ 1030.416030][T26478] device hsr_slave_1 entered promiscuous mode [ 1030.481153][T26478] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1030.493505][T26478] Cannot create hsr debugfs directory 02:52:45 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1030.742081][ T3584] Bluetooth: hci2: command 0x040f tx timeout 02:52:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x0, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1031.551720][ T1066] Bluetooth: hci7: command 0x0409 tx timeout 02:52:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x0, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1032.329960][T26753] Bluetooth: hci6: command 0x041b tx timeout 02:52:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x0, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1032.831834][T26743] Bluetooth: hci2: command 0x0419 tx timeout [ 1032.935435][T26671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1032.951541][T26671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1032.961904][T26671] device bridge_slave_0 entered promiscuous mode [ 1033.052207][T26671] bridge0: port 2(bridge_slave_1) entered blocking state [ 1033.059383][T26671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.068483][T26671] device bridge_slave_1 entered promiscuous mode 02:52:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1033.631516][T26743] Bluetooth: hci7: command 0x041b tx timeout 02:52:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1034.432286][T26742] Bluetooth: hci6: command 0x040f tx timeout [ 1034.758453][T26692] chnl_net:caif_netlink_parms(): no params data found [ 1034.785318][T26053] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1034.916651][T26053] netdevsim netdevsim1 netdevsim1: renamed from eth1 02:52:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1035.507346][T26671] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1035.536715][T26701] chnl_net:caif_netlink_parms(): no params data found [ 1035.555910][T26053] netdevsim netdevsim1 netdevsim2: renamed from eth2 02:52:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1035.702294][T26753] Bluetooth: hci7: command 0x040f tx timeout [ 1035.794579][T26053] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1036.070630][T26671] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:52:51 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:51 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1036.474348][T26671] team0: Port device team_slave_0 added [ 1036.508801][T26671] team0: Port device team_slave_1 added [ 1036.511745][T26743] Bluetooth: hci6: command 0x0419 tx timeout [ 1036.755095][T26692] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.762458][T26692] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.770693][T26692] device bridge_slave_0 entered promiscuous mode [ 1036.779469][T26692] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.786810][T26692] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.795252][T26692] device bridge_slave_1 entered promiscuous mode [ 1037.327722][T26671] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1037.336268][T26671] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 02:52:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1037.391461][T26671] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1037.781571][T26742] Bluetooth: hci7: command 0x0419 tx timeout 02:52:53 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1038.727352][T26692] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1038.748426][T26671] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1038.761459][T26671] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1038.851381][T26671] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:52:54 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1039.527219][T26692] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1039.559464][T26701] bridge0: port 1(bridge_slave_0) entered blocking state [ 1039.572867][T26701] bridge0: port 1(bridge_slave_0) entered disabled state [ 1039.581146][T26701] device bridge_slave_0 entered promiscuous mode 02:52:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1041.013452][T26701] bridge0: port 2(bridge_slave_1) entered blocking state [ 1041.031536][T26701] bridge0: port 2(bridge_slave_1) entered disabled state [ 1041.042277][T26701] device bridge_slave_1 entered promiscuous mode 02:52:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1042.074987][T26692] team0: Port device team_slave_0 added [ 1042.105621][T26701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 02:52:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1042.698781][T26692] team0: Port device team_slave_1 added [ 1042.734145][T26701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:52:58 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:52:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:00 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:00 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1050.501504][T26743] Bluetooth: hci3: command 0x0409 tx timeout 02:53:06 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:07 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x0, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1052.591431][T26743] Bluetooth: hci3: command 0x041b tx timeout 02:53:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x0, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1053.875197][T26701] team0: Port device team_slave_0 added 02:53:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x0, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1054.133092][T26671] device hsr_slave_0 entered promiscuous mode [ 1054.263884][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.270207][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 1054.625448][T26671] device hsr_slave_1 entered promiscuous mode [ 1054.661650][T26752] Bluetooth: hci3: command 0x040f tx timeout [ 1054.768280][T26671] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1054.776132][T26671] Cannot create hsr debugfs directory [ 1054.790508][T26692] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1054.801346][T26692] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1054.871342][T26692] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1054.897547][T26701] team0: Port device team_slave_1 added 02:53:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1056.633374][T26692] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1056.640442][T26692] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1056.672477][T26692] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1056.741610][T26742] Bluetooth: hci3: command 0x0419 tx timeout [ 1056.758198][T26701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1056.771481][T26701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1056.821804][T26701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:53:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1057.878200][T26701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1057.885762][T26701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.961446][T26701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:53:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1058.274853][T26692] device hsr_slave_0 entered promiscuous mode [ 1058.508069][T26692] device hsr_slave_1 entered promiscuous mode [ 1058.550033][T26692] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1058.562902][T26692] Cannot create hsr debugfs directory 02:53:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1059.124020][T26701] device hsr_slave_0 entered promiscuous mode [ 1059.191212][T26701] device hsr_slave_1 entered promiscuous mode [ 1059.247854][T26701] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1059.255510][T26701] Cannot create hsr debugfs directory 02:53:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1062.226955][T26671] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1062.379419][T26478] netdevsim netdevsim5 netdevsim0: renamed from eth0 02:53:17 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1063.220724][T26478] netdevsim netdevsim5 netdevsim1: renamed from eth1 02:53:18 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:19 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1064.665072][T26671] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 02:53:20 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1064.994847][T26478] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1065.031221][T26671] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1065.098532][T26478] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1065.138569][T26671] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1065.264695][T27044] chnl_net:caif_netlink_parms(): no params data found 02:53:20 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1066.136569][T26478] 8021q: adding VLAN 0 to HW filter on device bond0 02:53:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:22 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1066.953061][T27044] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.960130][T27044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1067.007840][T27044] device bridge_slave_0 entered promiscuous mode [ 1067.032117][T27044] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.051511][T27044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.059820][T27044] device bridge_slave_1 entered promiscuous mode 02:53:22 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:23 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1067.949623][T26478] 8021q: adding VLAN 0 to HW filter on device team0 [ 1067.972345][T26752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1067.980772][T26752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1068.014779][T27044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1068.348224][T27044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:53:23 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1068.551989][T26743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1068.560812][T26743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1068.591863][T26743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1068.599053][T26743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1068.621799][T26743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1068.630671][T26743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1068.651945][T26743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1068.659028][T26743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1068.668299][T26743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 02:53:24 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1069.570222][T26742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1069.578869][T26742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1069.600822][T26742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1069.618917][T26742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1069.638203][T26742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1069.654060][T26742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1069.672622][T27044] team0: Port device team_slave_0 added [ 1069.679450][T26742] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1069.698282][T26478] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1069.731399][T26478] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1069.764476][T27044] team0: Port device team_slave_1 added [ 1069.907456][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1069.920675][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1069.936288][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1069.944929][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 02:53:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1069.969931][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:53:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1070.898078][T27044] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1070.917873][T27044] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1070.972494][T27044] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:53:26 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:26 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1071.774730][T27044] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1071.788141][T27044] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1071.835020][T27044] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:53:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:29 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:29 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:31 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:34 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1080.195316][T27044] device hsr_slave_0 entered promiscuous mode [ 1080.562006][T27044] device hsr_slave_1 entered promiscuous mode 02:53:36 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1080.951675][T27044] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1080.959926][T27044] Cannot create hsr debugfs directory [ 1081.621564][T22048] Bluetooth: hci4: command 0x0409 tx timeout 02:53:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1083.702196][T26742] Bluetooth: hci4: command 0x041b tx timeout 02:53:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1085.501365][T27629] chnl_net:caif_netlink_parms(): no params data found [ 1085.791668][T26753] Bluetooth: hci4: command 0x040f tx timeout 02:53:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1086.920060][T27629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.952364][T27629] bridge0: port 1(bridge_slave_0) entered disabled state [ 1086.960746][T27629] device bridge_slave_0 entered promiscuous mode [ 1086.992103][T27629] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.011372][T27629] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.031825][T27629] device bridge_slave_1 entered promiscuous mode [ 1087.861670][T26746] Bluetooth: hci4: command 0x0419 tx timeout [ 1088.019933][T27629] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1088.044270][T27629] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:53:43 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1088.976635][T27629] team0: Port device team_slave_0 added [ 1088.995704][T27629] team0: Port device team_slave_1 added [ 1090.216595][T27629] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1090.224079][T27629] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1090.281383][T27629] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:53:45 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1091.333939][T27629] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1091.340906][T27629] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1091.411559][T27629] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:53:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1092.581545][T26753] Bluetooth: hci0: command 0x0409 tx timeout 02:53:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1093.762021][T27629] device hsr_slave_0 entered promiscuous mode [ 1093.828935][T27629] device hsr_slave_1 entered promiscuous mode [ 1094.111480][T27629] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1094.119161][T27629] Cannot create hsr debugfs directory 02:53:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1094.661563][T22047] Bluetooth: hci0: command 0x041b tx timeout 02:53:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1096.021758][ T3573] Bluetooth: hci2: command 0x0409 tx timeout 02:53:51 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1096.741563][ T3573] Bluetooth: hci0: command 0x040f tx timeout 02:53:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1097.461806][T22047] Bluetooth: hci5: command 0x0409 tx timeout [ 1097.854279][T27842] chnl_net:caif_netlink_parms(): no params data found [ 1098.111571][T26745] Bluetooth: hci2: command 0x041b tx timeout 02:53:53 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1098.831548][T26745] Bluetooth: hci0: command 0x0419 tx timeout [ 1099.541705][T26745] Bluetooth: hci5: command 0x041b tx timeout 02:53:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1100.181718][T26745] Bluetooth: hci2: command 0x040f tx timeout 02:53:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1101.621738][T26745] Bluetooth: hci5: command 0x040f tx timeout 02:53:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1102.271971][T26753] Bluetooth: hci2: command 0x0419 tx timeout 02:53:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:58 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1103.701693][T26753] Bluetooth: hci5: command 0x0419 tx timeout 02:53:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:53:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:00 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:03 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1108.788776][T27866] chnl_net:caif_netlink_parms(): no params data found [ 1108.800493][T27842] bridge0: port 1(bridge_slave_0) entered blocking state [ 1108.828759][T27842] bridge0: port 1(bridge_slave_0) entered disabled state [ 1108.853873][T27842] device bridge_slave_0 entered promiscuous mode [ 1108.875197][T27876] chnl_net:caif_netlink_parms(): no params data found [ 1108.899891][T27842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1108.921477][T27842] bridge0: port 2(bridge_slave_1) entered disabled state [ 1108.929913][T27842] device bridge_slave_1 entered promiscuous mode 02:54:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1110.334252][T27842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 02:54:06 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1111.696749][T27842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:54:07 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1112.211743][T27876] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.218828][T27876] bridge0: port 1(bridge_slave_0) entered disabled state [ 1112.232778][T27876] device bridge_slave_0 entered promiscuous mode [ 1112.987563][T27842] team0: Port device team_slave_0 added 02:54:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1114.647339][T27876] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.661495][T27876] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.670098][T27876] device bridge_slave_1 entered promiscuous mode 02:54:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1115.615658][T27842] team0: Port device team_slave_1 added [ 1115.703987][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.710293][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 02:54:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1116.022642][T27866] bridge0: port 1(bridge_slave_0) entered blocking state [ 1116.029771][T27866] bridge0: port 1(bridge_slave_0) entered disabled state [ 1116.085745][T27866] device bridge_slave_0 entered promiscuous mode [ 1116.581517][T19790] Bluetooth: hci6: command 0x0409 tx timeout [ 1116.899170][T27876] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1117.159048][T27866] bridge0: port 2(bridge_slave_1) entered blocking state [ 1117.172123][T27866] bridge0: port 2(bridge_slave_1) entered disabled state [ 1117.180499][T27866] device bridge_slave_1 entered promiscuous mode 02:54:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1117.268617][T27876] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1117.293992][T27842] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1117.300947][T27842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1117.342914][T27842] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:54:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1118.671823][T26742] Bluetooth: hci6: command 0x041b tx timeout [ 1118.866374][T27842] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1118.878310][T27842] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1118.931027][T27842] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:54:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1118.975852][T27866] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1118.990471][T27866] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1119.345544][T27876] team0: Port device team_slave_0 added 02:54:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1120.687043][T27876] team0: Port device team_slave_1 added [ 1120.698270][T27866] team0: Port device team_slave_0 added [ 1120.742024][T26743] Bluetooth: hci6: command 0x040f tx timeout 02:54:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1121.713505][T27842] device hsr_slave_0 entered promiscuous mode 02:54:17 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1122.069491][T27842] device hsr_slave_1 entered promiscuous mode [ 1122.323224][T27842] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1122.330813][T27842] Cannot create hsr debugfs directory [ 1122.347243][T27866] team0: Port device team_slave_1 added [ 1122.430872][T27876] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1122.441437][T27876] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1122.483574][T27876] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:54:17 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1122.821896][T26745] Bluetooth: hci6: command 0x0419 tx timeout 02:54:19 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:20 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1124.965219][T27876] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1124.981354][T27876] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1125.031381][T27876] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:54:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1126.319761][T27866] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1126.331776][T27866] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1126.380919][T27866] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:54:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:23 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:24 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:24 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1131.231778][T27866] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1131.238743][T27866] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1131.300409][T27866] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:54:26 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1131.960315][T27629] netdevsim netdevsim5 netdevsim0: renamed from eth0 02:54:27 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1132.379146][T27876] device hsr_slave_0 entered promiscuous mode [ 1132.666294][T27876] device hsr_slave_1 entered promiscuous mode [ 1132.922715][T27876] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1132.930512][T27876] Cannot create hsr debugfs directory 02:54:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1133.856553][T27629] netdevsim netdevsim5 netdevsim1: renamed from eth1 02:54:29 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1134.914612][T27866] device hsr_slave_0 entered promiscuous mode [ 1135.164777][T27866] device hsr_slave_1 entered promiscuous mode [ 1135.300204][T27866] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1135.311497][T27866] Cannot create hsr debugfs directory [ 1135.317076][T27629] netdevsim netdevsim5 netdevsim2: renamed from eth2 02:54:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1135.716077][T27629] netdevsim netdevsim5 netdevsim3: renamed from eth3 02:54:32 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:32 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:34 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:34 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:36 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f", 0x18, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1141.438920][T28033] chnl_net:caif_netlink_parms(): no params data found 02:54:36 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f", 0x18, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7d", 0xc, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7d", 0xc, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7d", 0xc, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1145.231675][T26743] Bluetooth: hci3: command 0x0409 tx timeout 02:54:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1145.968869][T28033] bridge0: port 1(bridge_slave_0) entered blocking state [ 1145.991436][T28033] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.999892][T28033] device bridge_slave_0 entered promiscuous mode [ 1146.024277][T28033] bridge0: port 2(bridge_slave_1) entered blocking state [ 1146.032225][T28033] bridge0: port 2(bridge_slave_1) entered disabled state [ 1146.052842][T28033] device bridge_slave_1 entered promiscuous mode 02:54:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1146.967612][T28033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1146.996174][T28033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1147.301558][T22048] Bluetooth: hci3: command 0x041b tx timeout [ 1147.557090][T28033] team0: Port device team_slave_0 added [ 1147.575647][T28033] team0: Port device team_slave_1 added 02:54:43 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a", 0x6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a", 0x6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1149.381494][T22048] Bluetooth: hci3: command 0x040f tx timeout [ 1149.388743][T28033] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1149.401394][T28033] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1149.471019][T28033] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1149.505543][T28033] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1149.521455][T28033] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1149.611560][T28033] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:54:45 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1151.461894][ T3573] Bluetooth: hci3: command 0x0419 tx timeout [ 1151.615156][T28033] device hsr_slave_0 entered promiscuous mode [ 1151.762639][T28033] device hsr_slave_1 entered promiscuous mode [ 1151.904209][T28033] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1151.931560][T28033] Cannot create hsr debugfs directory 02:54:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1152.642389][T28368] chnl_net:caif_netlink_parms(): no params data found 02:54:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa", 0x2, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1156.009289][T28368] bridge0: port 1(bridge_slave_0) entered blocking state [ 1156.026478][T28368] bridge0: port 1(bridge_slave_0) entered disabled state [ 1156.043393][T28368] device bridge_slave_0 entered promiscuous mode 02:54:51 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa", 0x2, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1157.094085][T28368] bridge0: port 2(bridge_slave_1) entered blocking state [ 1157.111459][T28368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1157.119896][T28368] device bridge_slave_1 entered promiscuous mode 02:54:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa", 0x2, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, 0x0, &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1158.105518][T28368] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1158.166223][T28368] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1158.661703][T19790] Bluetooth: hci4: command 0x0409 tx timeout 02:54:54 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, 0x0, &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1159.548126][T28368] team0: Port device team_slave_0 added [ 1159.645589][T28368] team0: Port device team_slave_1 added 02:54:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, 0x0, &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1160.033510][T28368] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1160.051381][T28368] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1160.101423][T28368] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1160.125254][T28368] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1160.147349][T28368] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1160.191485][T28368] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1160.741655][ T3575] Bluetooth: hci4: command 0x041b tx timeout 02:54:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), 0x0, &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:54:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), 0x0, &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1162.181668][T26746] Bluetooth: hci7: command 0x0409 tx timeout [ 1162.315308][T28368] device hsr_slave_0 entered promiscuous mode [ 1162.403739][T28368] device hsr_slave_1 entered promiscuous mode 02:54:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), 0x0, &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1162.542975][T28368] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1162.550733][T28368] Cannot create hsr debugfs directory [ 1162.821648][ T3575] Bluetooth: hci4: command 0x040f tx timeout [ 1163.154062][T28540] chnl_net:caif_netlink_parms(): no params data found 02:54:58 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), 0x0) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1163.461604][T19790] Bluetooth: hci2: command 0x0409 tx timeout [ 1164.261532][ T3575] Bluetooth: hci7: command 0x041b tx timeout [ 1164.902087][T19790] Bluetooth: hci4: command 0x0419 tx timeout 02:55:00 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), 0x0) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1165.541929][ T3575] Bluetooth: hci2: command 0x041b tx timeout [ 1165.741693][T28540] bridge0: port 1(bridge_slave_0) entered blocking state [ 1165.748808][T28540] bridge0: port 1(bridge_slave_0) entered disabled state [ 1165.770409][T28540] device bridge_slave_0 entered promiscuous mode [ 1165.789339][T28540] bridge0: port 2(bridge_slave_1) entered blocking state [ 1165.805842][T28540] bridge0: port 2(bridge_slave_1) entered disabled state [ 1165.820188][T28540] device bridge_slave_1 entered promiscuous mode 02:55:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), 0x0) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1166.341594][T22047] Bluetooth: hci7: command 0x040f tx timeout 02:55:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1167.631452][ T3575] Bluetooth: hci2: command 0x040f tx timeout [ 1167.718970][T28540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1167.867693][T28540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1168.421500][T22048] Bluetooth: hci7: command 0x0419 tx timeout 02:55:03 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c4") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1169.466577][T28540] team0: Port device team_slave_0 added [ 1169.701746][ T3575] Bluetooth: hci2: command 0x0419 tx timeout 02:55:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c4") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1169.977019][T28540] team0: Port device team_slave_1 added [ 1170.021029][T28558] chnl_net:caif_netlink_parms(): no params data found 02:55:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c4") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:06 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:06 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:07 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1173.232983][T28540] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1173.239951][T28540] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1173.302338][T28540] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:55:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1174.386877][T28540] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1174.401426][T28540] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1174.444794][T28540] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1174.463512][T28571] chnl_net:caif_netlink_parms(): no params data found 02:55:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1175.257598][T28558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1175.271585][T28558] bridge0: port 1(bridge_slave_0) entered disabled state [ 1175.292416][T28558] device bridge_slave_0 entered promiscuous mode [ 1175.323724][T28558] bridge0: port 2(bridge_slave_1) entered blocking state [ 1175.330803][T28558] bridge0: port 2(bridge_slave_1) entered disabled state [ 1175.352860][T28558] device bridge_slave_1 entered promiscuous mode [ 1175.564781][T28540] device hsr_slave_0 entered promiscuous mode [ 1175.582688][T28540] device hsr_slave_1 entered promiscuous mode [ 1175.601991][T28540] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1175.609577][T28540] Cannot create hsr debugfs directory 02:55:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1176.004891][T28558] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1176.056866][T28558] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:55:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1177.143834][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.150224][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 02:55:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa5") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1178.785855][T28558] team0: Port device team_slave_0 added 02:55:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa5") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa5") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1180.065727][T28571] bridge0: port 1(bridge_slave_0) entered blocking state [ 1180.076378][T28571] bridge0: port 1(bridge_slave_0) entered disabled state [ 1180.101976][T28571] device bridge_slave_0 entered promiscuous mode [ 1180.122954][T28558] team0: Port device team_slave_1 added [ 1180.133070][T28571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1180.140147][T28571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1180.162792][T28571] device bridge_slave_1 entered promiscuous mode 02:55:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f25") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f25") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:17 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f25") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1182.581748][T19790] Bluetooth: hci0: command 0x0409 tx timeout [ 1182.789425][T28558] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1182.801073][T28558] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1182.849593][T28558] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1182.876058][T28571] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 02:55:18 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1182.898548][T28558] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1182.910054][T28558] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1182.991640][T28558] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1183.065661][T28571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1184.663126][T26745] Bluetooth: hci0: command 0x041b tx timeout [ 1185.186786][T28571] team0: Port device team_slave_0 added [ 1185.482848][T28558] device hsr_slave_0 entered promiscuous mode [ 1185.497024][T28558] device hsr_slave_1 entered promiscuous mode [ 1185.510593][T28558] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1185.525142][T28558] Cannot create hsr debugfs directory [ 1185.536483][T28571] team0: Port device team_slave_1 added 02:55:20 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:21 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1186.376979][T28571] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1186.391464][T28571] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1186.425573][T28571] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1186.465179][T28571] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1186.472701][T28571] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1186.499354][T28571] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1186.752125][T26746] Bluetooth: hci0: command 0x040f tx timeout 02:55:22 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:23 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1187.974080][T28571] device hsr_slave_0 entered promiscuous mode [ 1188.162093][T28571] device hsr_slave_1 entered promiscuous mode [ 1188.334421][T28571] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1188.351429][T28571] Cannot create hsr debugfs directory 02:55:23 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1188.821790][T26742] Bluetooth: hci0: command 0x0419 tx timeout 02:55:24 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:25 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 1190.048020][T28774] chnl_net:caif_netlink_parms(): no params data found 02:55:25 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 1190.422374][T28774] bridge0: port 1(bridge_slave_0) entered blocking state [ 1190.441626][T28774] bridge0: port 1(bridge_slave_0) entered disabled state [ 1190.450206][T28774] device bridge_slave_0 entered promiscuous mode [ 1190.497803][T28774] bridge0: port 2(bridge_slave_1) entered blocking state [ 1190.511651][T28774] bridge0: port 2(bridge_slave_1) entered disabled state [ 1190.520702][T28774] device bridge_slave_1 entered promiscuous mode 02:55:26 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 02:55:26 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 1191.971214][T28774] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1191.996324][T28774] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:55:27 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1192.960902][T28774] team0: Port device team_slave_0 added [ 1192.969066][T28368] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1193.029011][T28774] team0: Port device team_slave_1 added [ 1193.061908][T28368] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1193.298669][T28368] netdevsim netdevsim5 netdevsim2: renamed from eth2 02:55:28 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1194.733020][T28774] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1194.739991][T28774] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 02:55:30 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1194.811483][T28774] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1195.000340][T28368] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1195.144151][T28774] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1195.151117][T28774] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1195.193235][T28774] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:55:30 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:31 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:32 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1197.006343][T28774] device hsr_slave_0 entered promiscuous mode [ 1197.023243][T28774] device hsr_slave_1 entered promiscuous mode [ 1197.030256][T28774] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1197.042043][T28774] Cannot create hsr debugfs directory 02:55:32 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f25") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa5") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa5") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1198.571889][T28368] 8021q: adding VLAN 0 to HW filter on device bond0 02:55:34 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1199.079034][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1199.092384][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1199.112947][T28368] 8021q: adding VLAN 0 to HW filter on device team0 [ 1199.151922][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1199.160691][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1199.182036][T19793] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.189115][T19793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1199.211946][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1199.223617][T19793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1199.241808][T19793] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.248901][T19793] bridge0: port 2(bridge_slave_1) entered forwarding state 02:55:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1200.193478][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1200.202627][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1200.219614][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1200.242587][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1200.253193][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1200.272004][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1200.281050][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1200.302299][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1200.310923][T19790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1200.336420][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1200.405583][T28540] netdevsim netdevsim3 netdevsim0: renamed from eth0 02:55:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1200.815365][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1200.832553][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1200.843636][T28368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:55:36 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1201.542513][T28540] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1201.708702][T28540] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1201.914545][T28540] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1202.119427][T28558] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1202.253295][T28558] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1202.542826][T28368] 8021q: adding VLAN 0 to HW filter on device batadv0 02:55:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1203.120973][T26753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1203.142023][T26753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1203.149676][T28558] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1203.217507][T28558] netdevsim netdevsim4 netdevsim3: renamed from eth3 02:55:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1204.482702][ T6979] device hsr_slave_0 left promiscuous mode 02:55:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1205.324057][ T6979] device hsr_slave_1 left promiscuous mode 02:55:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c4") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1205.701642][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1205.709341][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1205.854064][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1205.869725][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1205.977243][ T6979] device bridge_slave_1 left promiscuous mode [ 1206.007301][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1206.085879][ T6979] device bridge_slave_0 left promiscuous mode [ 1206.092476][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1206.108368][ T6979] device hsr_slave_0 left promiscuous mode [ 1206.135865][ T6979] device hsr_slave_1 left promiscuous mode [ 1206.351844][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1206.374444][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 02:55:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), 0x0) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1206.584769][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1206.622188][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1206.867681][ T6979] device bridge_slave_1 left promiscuous mode [ 1206.881540][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state 02:55:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), 0x0, &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1207.085879][ T6979] device bridge_slave_0 left promiscuous mode [ 1207.101528][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state 02:55:43 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), 0x0, &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1208.185098][ T6979] device hsr_slave_0 left promiscuous mode [ 1208.577251][ T6979] device hsr_slave_1 left promiscuous mode 02:55:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, 0x0, &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1209.203602][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1209.438456][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 02:55:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1209.924092][ T6979] device bridge_slave_1 left promiscuous mode [ 1209.930511][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.197242][ T6979] device bridge_slave_0 left promiscuous mode [ 1210.211570][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state 02:55:45 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1210.867804][ T6979] device hsr_slave_0 left promiscuous mode [ 1211.020072][ T6979] device hsr_slave_1 left promiscuous mode [ 1211.181659][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1211.273966][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1211.341159][ T6979] device bridge_slave_1 left promiscuous mode [ 1211.352166][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1211.439939][ T6979] device bridge_slave_0 left promiscuous mode [ 1211.451960][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1211.461814][T26745] Bluetooth: hci3: command 0x0409 tx timeout [ 1211.889770][ T6979] device hsr_slave_0 left promiscuous mode 02:55:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b", 0x3, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1212.211699][ T6979] device hsr_slave_1 left promiscuous mode [ 1212.301714][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1212.434461][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 02:55:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1212.558846][ T6979] device bridge_slave_1 left promiscuous mode [ 1212.571566][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1212.957059][ T6979] device bridge_slave_0 left promiscuous mode [ 1212.966838][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state 02:55:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7d", 0xc, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1213.342083][ T6979] device hsr_slave_0 left promiscuous mode [ 1213.351721][ T6979] device hsr_slave_1 left promiscuous mode [ 1213.371606][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1213.382372][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1213.403756][ T6979] device bridge_slave_1 left promiscuous mode [ 1213.409929][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1213.442014][ T6979] device bridge_slave_0 left promiscuous mode [ 1213.448244][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1213.541686][ T1069] Bluetooth: hci3: command 0x041b tx timeout 02:55:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f", 0x18, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1214.672233][ T6979] device hsr_slave_0 left promiscuous mode [ 1215.141951][ T6979] device hsr_slave_1 left promiscuous mode 02:55:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1215.576154][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1215.621626][ T3573] Bluetooth: hci3: command 0x040f tx timeout [ 1215.666450][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1215.690712][ T6979] device bridge_slave_1 left promiscuous mode [ 1215.701554][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1215.822128][ T6979] device bridge_slave_0 left promiscuous mode [ 1215.828366][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.025195][ T6979] device bridge_slave_1 left promiscuous mode [ 1216.041497][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state 02:55:51 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1216.457406][ T6979] device bridge_slave_0 left promiscuous mode [ 1216.467618][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.545009][ T6979] device hsr_slave_0 left promiscuous mode [ 1216.558403][ T6979] device hsr_slave_1 left promiscuous mode [ 1216.614743][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 02:55:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1216.713900][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1216.863919][ T6979] device bridge_slave_1 left promiscuous mode [ 1216.870141][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1217.042820][ T6979] device bridge_slave_0 left promiscuous mode [ 1217.049025][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state 02:55:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:55:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x100000, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1217.567466][ T6979] device hsr_slave_0 left promiscuous mode [ 1217.701745][ T3573] Bluetooth: hci3: command 0x0419 tx timeout 02:55:53 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1217.807252][ T6979] device hsr_slave_1 left promiscuous mode [ 1218.021555][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1218.030961][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1218.108387][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1218.124967][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1218.173943][ T6979] device bridge_slave_1 left promiscuous mode [ 1218.180145][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1218.206505][ T6979] device bridge_slave_0 left promiscuous mode [ 1218.221653][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1218.486859][ T6979] device hsr_slave_0 left promiscuous mode [ 1218.671622][ T6979] device hsr_slave_1 left promiscuous mode 02:55:54 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1218.774447][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1218.791662][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1219.043839][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1219.061469][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1219.143039][ T6979] device bridge_slave_1 left promiscuous mode [ 1219.149232][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1219.290454][ T6979] device bridge_slave_0 left promiscuous mode [ 1219.300536][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state 02:55:54 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1220.288956][ T6979] device hsr_slave_0 left promiscuous mode 02:55:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1220.870848][ T6979] device hsr_slave_1 left promiscuous mode 02:55:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1221.381552][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1221.389144][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1221.542480][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1221.550225][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1222.008233][ T6979] device bridge_slave_1 left promiscuous mode [ 1222.021574][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state 02:55:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1222.920201][ T6979] device bridge_slave_0 left promiscuous mode [ 1222.926749][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.213731][ T6979] device hsr_slave_0 left promiscuous mode [ 1223.224056][ T6979] device hsr_slave_1 left promiscuous mode 02:55:58 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1223.557771][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1223.581700][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1223.824439][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1223.841547][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1223.969120][ T6979] device bridge_slave_1 left promiscuous mode [ 1223.981541][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state 02:55:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1224.098297][ T6979] device bridge_slave_0 left promiscuous mode [ 1224.107552][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state 02:55:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1224.821486][ T3573] Bluetooth: hci5: command 0x0409 tx timeout [ 1225.291566][ T6979] device hsr_slave_0 left promiscuous mode [ 1225.430084][ T6979] device hsr_slave_1 left promiscuous mode 02:56:00 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1225.661692][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1225.669295][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1225.850686][ T6979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1225.861645][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1225.906368][ T6979] device bridge_slave_1 left promiscuous mode [ 1225.921538][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.136036][ T6979] device bridge_slave_0 left promiscuous mode [ 1226.146527][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.911686][T26743] Bluetooth: hci5: command 0x041b tx timeout [ 1226.941871][ T6979] device hsr_slave_0 left promiscuous mode [ 1227.051766][ T6979] device hsr_slave_1 left promiscuous mode 02:56:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1227.198690][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1227.300685][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1227.726777][ T6979] device bridge_slave_1 left promiscuous mode [ 1227.739866][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.845161][ T6979] device bridge_slave_0 left promiscuous mode [ 1227.855009][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.223337][ T6979] device hsr_slave_0 left promiscuous mode [ 1228.231956][ T6979] device hsr_slave_1 left promiscuous mode [ 1228.263228][T26743] Bluetooth: hci6: command 0x0409 tx timeout 02:56:03 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1228.269486][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1228.283646][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1228.303585][ T6979] device bridge_slave_1 left promiscuous mode [ 1228.310010][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.332665][ T6979] device bridge_slave_0 left promiscuous mode [ 1228.338868][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.366328][ T6979] device hsr_slave_0 left promiscuous mode [ 1228.375720][ T6979] device hsr_slave_1 left promiscuous mode [ 1228.761039][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1228.928476][ T6979] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1228.982296][ T3573] Bluetooth: hci5: command 0x040f tx timeout [ 1228.992603][ T6979] device bridge_slave_1 left promiscuous mode [ 1228.998807][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state 02:56:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1229.376064][ T6979] device bridge_slave_0 left promiscuous mode [ 1229.386368][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1229.541443][T26743] Bluetooth: hci8: command 0x0409 tx timeout 02:56:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1229.756193][ T6979] device veth1_macvtap left promiscuous mode [ 1229.791473][ T6979] device veth0_macvtap left promiscuous mode [ 1229.797558][ T6979] device veth1_vlan left promiscuous mode [ 1229.827741][ T6979] device veth0_vlan left promiscuous mode [ 1230.341475][ T1069] Bluetooth: hci6: command 0x041b tx timeout 02:56:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1231.061578][ T1069] Bluetooth: hci5: command 0x0419 tx timeout 02:56:06 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1231.581663][ T6979] device veth1_macvtap left promiscuous mode [ 1231.587909][ T6979] device veth0_macvtap left promiscuous mode [ 1231.613110][ T6979] device veth1_vlan left promiscuous mode [ 1231.618913][ T6979] device veth0_vlan left promiscuous mode [ 1231.621517][ T3573] Bluetooth: hci8: command 0x041b tx timeout [ 1231.792326][ T6979] device veth0_vlan left promiscuous mode [ 1232.421559][ T1069] Bluetooth: hci6: command 0x040f tx timeout [ 1232.656769][ T6979] device veth1_macvtap left promiscuous mode [ 1232.666975][ T6979] device veth0_macvtap left promiscuous mode [ 1232.679279][ T6979] device veth1_vlan left promiscuous mode [ 1232.685127][ T6979] device veth0_vlan left promiscuous mode 02:56:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1233.482910][ T6979] device veth1_macvtap left promiscuous mode [ 1233.489002][ T6979] device veth0_macvtap left promiscuous mode [ 1233.511464][ T6979] device veth1_vlan left promiscuous mode [ 1233.517327][ T6979] device veth0_vlan left promiscuous mode 02:56:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1233.701672][ T3573] Bluetooth: hci8: command 0x040f tx timeout [ 1234.271109][ T6979] device veth1_macvtap left promiscuous mode [ 1234.289812][ T6979] device veth0_macvtap left promiscuous mode [ 1234.302837][ T6979] device veth1_vlan left promiscuous mode [ 1234.309597][ T6979] device veth0_vlan left promiscuous mode [ 1234.330596][ T6979] device veth1_macvtap left promiscuous mode [ 1234.336717][ T6979] device veth0_macvtap left promiscuous mode [ 1234.361831][ T6979] device veth1_vlan left promiscuous mode [ 1234.367645][ T6979] device veth0_vlan left promiscuous mode [ 1234.375040][ T6979] device veth1_macvtap left promiscuous mode [ 1234.393290][ T6979] device veth0_macvtap left promiscuous mode [ 1234.399364][ T6979] device veth1_vlan left promiscuous mode [ 1234.411446][ T6979] device veth0_vlan left promiscuous mode [ 1234.501608][ T3573] Bluetooth: hci6: command 0x0419 tx timeout 02:56:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1235.781534][ T1069] Bluetooth: hci8: command 0x0419 tx timeout 02:56:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1238.583898][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.590203][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 02:56:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:17 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:18 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:20 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:22 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:23 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1248.741687][ T1069] Bluetooth: hci9: command 0x0409 tx timeout 02:56:24 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1250.821547][T26743] Bluetooth: hci9: command 0x041b tx timeout 02:56:26 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:26 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:27 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1252.911452][T26745] Bluetooth: hci9: command 0x040f tx timeout 02:56:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1254.981505][T26745] Bluetooth: hci9: command 0x0419 tx timeout 02:56:32 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x0, 0xa}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x0, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:34 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:36 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x0, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x0, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:43 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x0, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x0, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:45 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x0, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x0, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1271.122016][ T6979] team0 (unregistering): Port device team_slave_1 removed [ 1271.152112][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1271.177413][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1271.299350][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:56:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x0, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x0, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x0, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1273.722455][ T6979] bond0 (unregistering): Released all slaves 02:56:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x0, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x0, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x0, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:51 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1277.461646][T26743] Bluetooth: hci10: command 0x0409 tx timeout [ 1278.339809][ T6979] team0 (unregistering): Port device team_slave_1 removed [ 1278.572516][ T6979] team0 (unregistering): Port device team_slave_0 removed 02:56:54 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1278.750885][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1278.784080][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1279.542932][ T1069] Bluetooth: hci10: command 0x041b tx timeout 02:56:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:56:55 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") 02:56:56 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") [ 1281.621491][ T1069] Bluetooth: hci10: command 0x040f tx timeout [ 1281.631446][ T1069] Bluetooth: hci4: command 0x0406 tx timeout 02:56:57 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") [ 1282.211011][ T6979] bond0 (unregistering): Released all slaves 02:56:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) [ 1283.701699][T19793] Bluetooth: hci10: command 0x0419 tx timeout 02:56:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) 02:56:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) 02:57:00 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:01 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:01 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000007c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1286.741500][ T1069] Bluetooth: hci7: command 0x0406 tx timeout [ 1286.741553][T26743] Bluetooth: hci2: command 0x0406 tx timeout 02:57:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1287.468027][ T6979] team0 (unregistering): Port device team_slave_1 removed 02:57:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1287.902215][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1288.172026][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1288.429899][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:03 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1290.202666][ T6979] bond0 (unregistering): Released all slaves 02:57:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1290.822484][T26743] Bluetooth: hci11: command 0x0409 tx timeout [ 1292.901514][T26745] Bluetooth: hci11: command 0x041b tx timeout 02:57:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1294.421585][T19793] Bluetooth: hci12: command 0x0409 tx timeout 02:57:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1294.991665][T26745] Bluetooth: hci11: command 0x040f tx timeout [ 1295.249251][ T6979] team0 (unregistering): Port device team_slave_1 removed 02:57:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1295.768445][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1295.781755][T26743] Bluetooth: hci13: command 0x0409 tx timeout 02:57:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1295.962127][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 02:57:11 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1296.502074][T26743] Bluetooth: hci12: command 0x041b tx timeout [ 1296.552433][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1297.061761][T26745] Bluetooth: hci11: command 0x0419 tx timeout 02:57:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1297.871666][T26743] Bluetooth: hci13: command 0x041b tx timeout 02:57:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1298.581817][T26745] Bluetooth: hci12: command 0x040f tx timeout [ 1298.775225][ T6979] bond0 (unregistering): Released all slaves 02:57:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r0 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r0, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1299.943350][T26745] Bluetooth: hci13: command 0x040f tx timeout [ 1300.023618][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1300.029920][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 1300.671884][T26743] Bluetooth: hci12: command 0x0419 tx timeout 02:57:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:16 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="18d8d53eaf8404298ca678000000a518ed474adbdb1fe5e2b0aa27ca377c00000404000e01cd6c139494a5709336f5a66144bca3f4", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000400b703000000000000850000d16e0083000000bf09000000000000550901000000000095000000"], &(0x7f0000000300)='syzkaller\x00', 0xfffffe00, 0xfb, &(0x7f0000000340)=""/251, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000004c0)=[{0x4, 0x2, 0xa, 0x1}, {0x0, 0x3, 0x6, 0xc}, {0x4, 0x3, 0x2, 0x7}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x0, 0x1, 0x3}, {0x0, 0x4, 0xf, 0xa}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:17 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1302.031612][T26743] Bluetooth: hci13: command 0x0419 tx timeout 02:57:18 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:19 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1304.292683][ T6979] team0 (unregistering): Port device team_slave_1 removed 02:57:19 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1304.953270][ T6979] team0 (unregistering): Port device team_slave_0 removed 02:57:20 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1305.222256][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1305.684369][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x0, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:21 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x0, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1307.221700][ T1069] Bluetooth: hci0: command 0x0406 tx timeout 02:57:22 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x0, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:23 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:23 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1308.512274][ T6979] bond0 (unregistering): Released all slaves 02:57:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x0, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:25 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1310.836047][ T6979] team0 (unregistering): Port device team_slave_1 removed 02:57:26 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1311.022422][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1311.494191][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 02:57:27 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1311.851852][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:27 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:28 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:29 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1314.050657][ T6979] bond0 (unregistering): Released all slaves 02:57:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1314.821390][ T1069] Bluetooth: hci14: command 0x0409 tx timeout 02:57:30 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:31 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1316.911665][T26743] Bluetooth: hci14: command 0x041b tx timeout 02:57:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:33 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1318.981577][T26742] Bluetooth: hci14: command 0x040f tx timeout 02:57:34 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1319.151164][ T6979] team0 (unregistering): Port device team_slave_1 removed [ 1319.177990][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1319.432436][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1319.465233][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:35 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1320.856889][ T6979] bond0 (unregistering): Released all slaves [ 1321.043185][ T6979] bond0 (unregistering): Released all slaves [ 1321.061609][T26742] Bluetooth: hci14: command 0x0419 tx timeout 02:57:37 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1322.615619][ T6979] bond0 (unregistering): Released all slaves [ 1322.746694][ T6979] bond0 (unregistering): Released all slaves 02:57:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1323.231879][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1323.372317][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:38 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1324.149800][ T6979] bond0 (unregistering): Released all slaves 02:57:40 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:41 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:44 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1329.519974][ T6979] team0 (unregistering): Port device team_slave_1 removed 02:57:45 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1329.754004][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1330.167653][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 02:57:45 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1330.612090][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:46 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:47 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1332.821719][T26743] Bluetooth: hci3: command 0x0406 tx timeout [ 1333.037711][ T6979] bond0 (unregistering): Released all slaves 02:57:48 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:49 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:50 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1336.059540][ T6979] team0 (unregistering): Port device team_slave_1 removed [ 1336.278111][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1336.651179][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 02:57:52 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1337.031832][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:57:53 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1338.932287][ T6979] bond0 (unregistering): Released all slaves 02:57:54 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:55 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1340.812523][ T6979] team0 (unregistering): Port device team_slave_1 removed [ 1341.403291][ T6979] team0 (unregistering): Port device team_slave_0 removed 02:57:56 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1341.762643][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 02:57:57 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1342.622122][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1343.463346][T26745] Bluetooth: hci15: command 0x0409 tx timeout 02:57:58 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:57:59 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:58:00 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1345.530294][ T6979] bond0 (unregistering): Released all slaves [ 1345.541642][T26745] Bluetooth: hci15: command 0x041b tx timeout 02:58:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:58:01 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:58:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:58:02 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1347.621620][T26743] Bluetooth: hci15: command 0x040f tx timeout 02:58:03 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1348.181948][T26742] Bluetooth: hci5: command 0x0406 tx timeout 02:58:03 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:58:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:58:04 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1349.263182][ T6979] team0 (unregistering): Port device team_slave_1 removed [ 1349.297882][ T6979] team0 (unregistering): Port device team_slave_0 removed [ 1349.332499][ T6979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1349.365876][ T6979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1349.701703][T26745] Bluetooth: hci15: command 0x0419 tx timeout 02:58:05 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 02:58:06 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1351.253657][ T6979] bond0 (unregistering): Released all slaves 02:58:07 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1353.311554][T26745] Bluetooth: hci6: command 0x0406 tx timeout [ 1353.319877][T26745] Bluetooth: hci8: command 0x0406 tx timeout 02:58:08 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1353.781909][ T27] INFO: task kworker/0:35:26746 blocked for more than 143 seconds. [ 1353.790132][ T27] Not tainted 5.15.147-syzkaller #0 [ 1353.810090][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1353.831378][ T27] task:kworker/0:35 state:D stack:27008 pid:26746 ppid: 2 flags:0x00004000 [ 1353.852195][ T27] Workqueue: events linkwatch_event [ 1353.857542][ T27] Call Trace: [ 1353.860821][ T27] [ 1353.881413][ T27] __schedule+0x12c4/0x45b0 [ 1353.886074][ T27] ? mark_lock+0x98/0x340 [ 1353.890483][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1353.897006][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1353.903313][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1353.909232][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1353.914886][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1353.920103][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1353.925759][ T27] schedule+0x11b/0x1f0 [ 1353.929935][ T27] schedule_preempt_disabled+0xf/0x20 [ 1353.935718][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1353.940939][ T27] ? linkwatch_event+0xa/0x50 [ 1353.950786][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1353.961979][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1353.968002][ T27] ? print_irqtrace_events+0x210/0x210 [ 1353.981353][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1353.986634][ T27] mutex_lock_nested+0x17/0x20 [ 1353.991804][ T27] linkwatch_event+0xa/0x50 [ 1353.996318][ T27] process_one_work+0x8a1/0x10c0 [ 1354.005946][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1354.021591][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1354.027202][ T27] ? kthread_data+0x4e/0xc0 [ 1354.041399][ T27] ? wq_worker_running+0x97/0x170 [ 1354.046472][ T27] worker_thread+0xaca/0x1280 [ 1354.051195][ T27] kthread+0x3f6/0x4f0 [ 1354.081454][ T27] ? rcu_lock_release+0x20/0x20 [ 1354.091489][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1354.096118][ T27] ret_from_fork+0x1f/0x30 [ 1354.100586][ T27] [ 1354.121406][ T27] INFO: task kworker/0:41:26752 blocked for more than 143 seconds. [ 1354.129493][ T27] Not tainted 5.15.147-syzkaller #0 [ 1354.151478][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1354.160612][ T27] task:kworker/0:41 state:D stack:25560 pid:26752 ppid: 2 flags:0x00004000 [ 1354.191484][ T27] Workqueue: ipv6_addrconf addrconf_dad_work [ 1354.197672][ T27] Call Trace: [ 1354.201056][ T27] [ 1354.221455][ T27] __schedule+0x12c4/0x45b0 [ 1354.226164][ T27] ? mark_lock+0x98/0x340 [ 1354.230517][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1354.251436][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1354.257724][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1354.281490][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1354.286828][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1354.311380][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1354.316959][ T27] schedule+0x11b/0x1f0 [ 1354.321253][ T27] schedule_preempt_disabled+0xf/0x20 [ 1354.331376][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1354.336686][ T27] ? addrconf_dad_work+0xcc/0x1720 02:58:09 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1354.361559][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1354.366815][ T27] mutex_lock_nested+0x17/0x20 [ 1354.385701][ T27] addrconf_dad_work+0xcc/0x1720 [ 1354.390806][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1354.411518][ T27] ? rcu_lock_release+0x20/0x20 [ 1354.416417][ T27] ? print_irqtrace_events+0x210/0x210 [ 1354.438862][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1354.451421][ T27] process_one_work+0x8a1/0x10c0 [ 1354.456420][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1354.472995][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1354.478590][ T27] ? kthread_data+0x4e/0xc0 [ 1354.501562][ T27] ? wq_worker_running+0x97/0x170 [ 1354.506627][ T27] worker_thread+0xaca/0x1280 [ 1354.521430][ T27] kthread+0x3f6/0x4f0 [ 1354.525534][ T27] ? rcu_lock_release+0x20/0x20 [ 1354.530390][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1354.544938][ T27] ret_from_fork+0x1f/0x30 [ 1354.549601][ T27] [ 1354.562018][ T27] INFO: task kworker/0:42:26753 blocked for more than 144 seconds. [ 1354.570188][ T27] Not tainted 5.15.147-syzkaller #0 [ 1354.591394][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1354.600201][ T27] task:kworker/0:42 state:D stack:26584 pid:26753 ppid: 2 flags:0x00004000 [ 1354.621970][ T27] Workqueue: events switchdev_deferred_process_work [ 1354.628690][ T27] Call Trace: [ 1354.651438][ T27] [ 1354.654495][ T27] __schedule+0x12c4/0x45b0 [ 1354.659176][ T27] ? mark_lock+0x98/0x340 [ 1354.691426][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1354.697618][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1354.731943][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1354.737443][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1354.743350][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1354.748762][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1354.769858][ T27] schedule+0x11b/0x1f0 [ 1354.791417][ T27] schedule_preempt_disabled+0xf/0x20 [ 1354.796844][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1354.811423][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1354.817525][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1354.851368][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1354.857394][ T27] ? print_irqtrace_events+0x210/0x210 [ 1354.871403][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1354.876812][ T27] mutex_lock_nested+0x17/0x20 [ 1354.891374][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1354.897397][ T27] process_one_work+0x8a1/0x10c0 [ 1354.931427][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1354.937105][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1354.951956][ T27] ? kthread_data+0x4e/0xc0 [ 1354.956601][ T27] ? wq_worker_running+0x97/0x170 [ 1354.966763][ T27] worker_thread+0xaca/0x1280 [ 1354.971816][ T27] kthread+0x3f6/0x4f0 [ 1354.976037][ T27] ? rcu_lock_release+0x20/0x20 [ 1354.980895][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1354.991411][ T27] ret_from_fork+0x1f/0x30 [ 1354.995955][ T27] [ 1354.999087][ T27] INFO: task syz-executor.5:28368 blocked for more than 144 seconds. [ 1355.007775][ T27] Not tainted 5.15.147-syzkaller #0 [ 1355.021427][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1355.030122][ T27] task:syz-executor.5 state:D stack:21080 pid:28368 ppid: 1 flags:0x00004006 [ 1355.061968][ T27] Call Trace: [ 1355.065369][ T27] [ 1355.068326][ T27] __schedule+0x12c4/0x45b0 [ 1355.096054][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1355.111399][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1355.116909][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1355.141693][ T27] schedule+0x11b/0x1f0 [ 1355.145897][ T27] schedule_preempt_disabled+0xf/0x20 [ 1355.151285][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1355.177441][ T27] ? tun_chr_close+0x3a/0x1b0 [ 1355.211419][ T27] ? mutex_lock_io_nested+0x60/0x60 02:58:10 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1355.216714][ T27] ? __fsnotify_update_child_dentry_flags+0x2a0/0x2a0 [ 1355.224840][ T27] mutex_lock_nested+0x17/0x20 [ 1355.229752][ T27] tun_chr_close+0x3a/0x1b0 [ 1355.251555][ T27] ? tun_chr_open+0x4d0/0x4d0 [ 1355.256361][ T27] __fput+0x3bf/0x890 [ 1355.260494][ T27] task_work_run+0x129/0x1a0 [ 1355.301866][ T27] do_exit+0x6a3/0x2480 [ 1355.306160][ T27] ? put_task_struct+0x80/0x80 [ 1355.310945][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1355.331411][ T27] do_group_exit+0x144/0x310 [ 1355.361374][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1355.366612][ T27] get_signal+0xc66/0x14e0 [ 1355.371117][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 1355.411479][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1355.416809][ T27] ? __sys_sendto+0x5a2/0x720 [ 1355.441476][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1355.446997][ T27] ? get_sigframe_size+0x10/0x10 [ 1355.471626][ T27] ? print_irqtrace_events+0x210/0x210 [ 1355.477280][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 1355.507474][ T27] exit_to_user_mode_loop+0x97/0x130 [ 1355.521360][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 1355.527048][ T27] syscall_exit_to_user_mode+0x5d/0x250 [ 1355.561356][ T27] do_syscall_64+0x49/0xb0 [ 1355.565871][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1355.591411][ T27] RIP: 0033:0x7ff3ecde8a9c [ 1355.595857][ T27] RSP: 002b:00007ffe42501750 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1355.621532][ T27] RAX: 0000000000000028 RBX: 00007ff3eda3e620 RCX: 00007ff3ecde8a9c [ 1355.629540][ T27] RDX: 0000000000000028 RSI: 00007ff3eda3e670 RDI: 0000000000000003 [ 1355.661330][ T27] RBP: 0000000000000000 R08: 00007ffe425017a4 R09: 000000000000000c [ 1355.669399][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1355.701461][ T27] R13: 0000000000000000 R14: 00007ff3eda3e670 R15: 0000000000000000 [ 1355.709486][ T27] [ 1355.729801][ T27] INFO: task syz-executor.3:28540 blocked for more than 145 seconds. [ 1355.740456][ T27] Not tainted 5.15.147-syzkaller #0 [ 1355.746483][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1355.755465][ T27] task:syz-executor.3 state:D stack:21088 pid:28540 ppid: 1 flags:0x00004006 [ 1355.784345][ T27] Call Trace: [ 1355.787680][ T27] [ 1355.790618][ T27] __schedule+0x12c4/0x45b0 [ 1355.821365][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1355.827297][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1355.841344][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1355.846575][ T27] schedule+0x11b/0x1f0 [ 1355.850748][ T27] schedule_preempt_disabled+0xf/0x20 [ 1355.873482][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1355.878733][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1355.891427][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1355.891485][ T27] mutex_lock_nested+0x17/0x20 [ 1355.921415][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1355.926391][ T27] ? reacquire_held_locks+0x660/0x660 [ 1355.941347][ T27] ? rtnetlink_bind+0x80/0x80 [ 1355.946056][ T27] ? is_bpf_text_address+0x24f/0x260 [ 1355.971429][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1355.976486][ T27] ? __kernel_text_address+0x94/0x100 [ 1355.998686][ T27] ? unwind_get_return_address+0x49/0x80 [ 1356.009622][ T27] ? arch_stack_walk+0xf3/0x140 [ 1356.021516][ T27] ? mark_lock+0x98/0x340 [ 1356.025885][ T27] ? mark_lock+0x98/0x340 [ 1356.030223][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1356.052718][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1356.057530][ T27] ? rtnetlink_bind+0x80/0x80 [ 1356.081377][ T27] ? netlink_ack+0xb10/0xb10 [ 1356.086024][ T27] netlink_unicast+0x7b6/0x980 [ 1356.090809][ T27] ? netlink_detachskb+0x90/0x90 [ 1356.107420][ T27] ? 0xffffffff81000000 [ 1356.112113][ T27] ? __check_object_size+0x300/0x410 [ 1356.117469][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1356.131475][ T27] netlink_sendmsg+0xa30/0xd60 [ 1356.136300][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1356.141865][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1356.146978][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1356.152700][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1356.158249][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1356.163901][ T27] __sys_sendto+0x564/0x720 [ 1356.168437][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1356.174228][ T27] ? print_irqtrace_events+0x210/0x210 [ 1356.179704][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1356.191361][ T27] __x64_sys_sendto+0xda/0xf0 [ 1356.196073][ T27] do_syscall_64+0x3d/0xb0 [ 1356.200506][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1356.251360][ T27] RIP: 0033:0x7f3f848eea9c [ 1356.255824][ T27] RSP: 002b:00007ffefb635530 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1356.281389][ T27] RAX: ffffffffffffffda RBX: 00007f3f85544620 RCX: 00007f3f848eea9c [ 1356.289400][ T27] RDX: 0000000000000040 RSI: 00007f3f85544670 RDI: 0000000000000003 [ 1356.321402][ T27] RBP: 0000000000000000 R08: 00007ffefb635584 R09: 000000000000000c [ 1356.329410][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1356.352487][ T27] R13: 0000000000000000 R14: 00007f3f85544670 R15: 0000000000000000 [ 1356.360515][ T27] [ 1356.395558][ T27] INFO: task syz-executor.4:28558 blocked for more than 145 seconds. [ 1356.404209][ T27] Not tainted 5.15.147-syzkaller #0 [ 1356.410130][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1356.451393][ T27] task:syz-executor.4 state:D stack:21624 pid:28558 ppid: 1 flags:0x00004006 [ 1356.460648][ T27] Call Trace: [ 1356.471412][ T27] [ 1356.474376][ T27] __schedule+0x12c4/0x45b0 [ 1356.478925][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1356.501341][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1356.506937][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1356.521347][ T27] schedule+0x11b/0x1f0 [ 1356.525546][ T27] schedule_preempt_disabled+0xf/0x20 [ 1356.530936][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1356.558307][ T27] ? genl_rcv_msg+0x124/0x14a0 [ 1356.571374][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1356.576624][ T27] ? reacquire_held_locks+0x660/0x660 [ 1356.591338][ T27] ? unwind_next_frame+0x1437/0x1fa0 [ 1356.596675][ T27] ? reacquire_held_locks+0x660/0x660 [ 1356.621344][ T27] ? radix_tree_lookup+0x234/0x280 [ 1356.626575][ T27] mutex_lock_nested+0x17/0x20 [ 1356.641343][ T27] genl_rcv_msg+0x124/0x14a0 [ 1356.645978][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1356.651011][ T27] ? __kernel_text_address+0x94/0x100 [ 1356.671358][ T27] ? unwind_get_return_address+0x49/0x80 [ 1356.677043][ T27] ? genl_bind+0x420/0x420 [ 1356.701423][ T27] ? arch_stack_walk+0xf3/0x140 [ 1356.706325][ T27] ? mark_lock+0x98/0x340 [ 1356.710672][ T27] ? mark_lock+0x98/0x340 [ 1356.731471][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1356.736571][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1356.761429][ T27] ? genl_bind+0x420/0x420 [ 1356.765890][ T27] ? netlink_ack+0xb10/0xb10 [ 1356.770497][ T27] ? down_read+0x1b3/0x2e0 02:58:12 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1356.788032][ T27] ? genl_rcv+0x9/0x40 [ 1356.801352][ T27] genl_rcv+0x24/0x40 [ 1356.805388][ T27] netlink_unicast+0x7b6/0x980 [ 1356.810190][ T27] ? netlink_detachskb+0x90/0x90 [ 1356.834075][ T27] ? 0xffffffff81000000 [ 1356.871666][ T27] ? __check_object_size+0x300/0x410 [ 1356.877006][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1356.911370][ T27] netlink_sendmsg+0xa30/0xd60 [ 1356.916193][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1356.939806][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1356.952019][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1356.971419][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1356.976915][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1357.001445][ T27] __sys_sendto+0x564/0x720 [ 1357.007731][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1357.013682][ T27] ? print_irqtrace_events+0x210/0x210 [ 1357.019283][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1357.042806][ T27] __x64_sys_sendto+0xda/0xf0 [ 1357.060427][ T27] do_syscall_64+0x3d/0xb0 [ 1357.071611][T26743] Bluetooth: hci16: command 0x0409 tx timeout [ 1357.071895][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1357.101413][ T27] RIP: 0033:0x7fe5877dea9c [ 1357.105870][ T27] RSP: 002b:00007ffef1e36e10 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1357.127346][ T27] RAX: ffffffffffffffda RBX: 00007fe588434620 RCX: 00007fe5877dea9c [ 1357.135421][ T27] RDX: 0000000000000024 RSI: 00007fe588434670 RDI: 0000000000000005 [ 1357.161394][ T27] RBP: 0000000000000000 R08: 00007ffef1e36e64 R09: 000000000000000c [ 1357.169408][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 1357.191371][ T27] R13: 00007ffef1e36eb8 R14: 00007fe588434670 R15: 0000000000000000 [ 1357.199395][ T27] [ 1357.211461][ T27] INFO: task syz-executor.0:28571 blocked for more than 146 seconds. [ 1357.219565][ T27] Not tainted 5.15.147-syzkaller #0 [ 1357.237027][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1357.255221][ T27] task:syz-executor.0 state:D stack:21624 pid:28571 ppid: 1 flags:0x00004006 [ 1357.264737][ T27] Call Trace: [ 1357.268075][ T27] [ 1357.271141][ T27] __schedule+0x12c4/0x45b0 [ 1357.311455][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1357.317543][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1357.343547][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1357.348915][ T27] schedule+0x11b/0x1f0 [ 1357.375065][ T27] schedule_preempt_disabled+0xf/0x20 [ 1357.392053][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1357.397310][ T27] ? devlink_nl_port_fill+0x2ab/0x930 [ 1357.421424][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1357.426676][ T27] ? __nlmsg_put+0xf3/0x190 [ 1357.431187][ T27] ? skb_put+0x110/0x1f0 [ 1357.451451][ T27] ? nla_put+0x12d/0x1e0 [ 1357.455745][ T27] ? memcpy+0x3c/0x60 [ 1357.459804][ T27] mutex_lock_nested+0x17/0x20 [ 1357.481489][ T27] devlink_nl_port_fill+0x2ab/0x930 [ 1357.486755][ T27] ? devlink_reload_stats_put+0xe10/0xe10 [ 1357.502008][ T27] ? devlink_get_from_attrs+0x390/0x390 [ 1357.507593][ T27] ? __mutex_lock_common+0x444/0x25a0 [ 1357.523958][ T27] devlink_nl_cmd_port_get_dumpit+0x312/0x5d0 [ 1357.530067][ T27] ? genl_lock_dumpit+0x47/0x90 [ 1357.542185][ T27] ? devlink_nl_cmd_port_get_doit+0x1f0/0x1f0 [ 1357.548299][ T27] ? __phys_addr+0xb6/0x170 [ 1357.560568][ T27] genl_lock_dumpit+0x69/0x90 [ 1357.567786][ T27] netlink_dump+0x606/0xc40 [ 1357.574876][ T27] ? netlink_lookup+0x1d0/0x1d0 [ 1357.579752][ T27] ? genl_start+0x144/0x490 [ 1357.590165][ T27] ? genl_start+0x2e1/0x490 [ 1357.597234][ T27] __netlink_dump_start+0x52f/0x6f0 [ 1357.606099][ T27] genl_rcv_msg+0xb8f/0x14a0 [ 1357.610746][ T27] ? genl_bind+0x420/0x420 [ 1357.620008][ T27] ? arch_stack_walk+0xf3/0x140 [ 1357.630674][ T27] ? mark_lock+0x98/0x340 [ 1357.640906][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1357.649585][ T27] ? genl_rcv_msg+0x14a0/0x14a0 [ 1357.656964][ T27] ? genl_start+0x490/0x490 [ 1357.665609][ T27] ? genl_lock_dumpit+0x90/0x90 [ 1357.670491][ T27] ? devlink_nl_cmd_get_dumpit+0x580/0x580 [ 1357.683409][ T27] ? devlink_nl_cmd_port_get_doit+0x1f0/0x1f0 [ 1357.689516][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1357.698199][ T27] ? genl_bind+0x420/0x420 [ 1357.705634][ T27] ? netlink_ack+0xb10/0xb10 [ 1357.710255][ T27] ? down_read+0x1b3/0x2e0 [ 1357.718385][ T27] ? genl_rcv+0x9/0x40 [ 1357.724993][ T27] genl_rcv+0x24/0x40 [ 1357.728994][ T27] netlink_unicast+0x7b6/0x980 [ 1357.737766][ T27] ? netlink_detachskb+0x90/0x90 [ 1357.745520][ T27] ? 0xffffffff81000000 [ 1357.749684][ T27] ? __check_object_size+0x300/0x410 [ 1357.758751][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1357.766436][ T27] netlink_sendmsg+0xa30/0xd60 [ 1357.771228][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1357.781416][ T27] ? aa_sock_msg_perm+0x91/0x150 02:58:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1357.786504][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1357.795547][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1357.801027][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1357.831340][ T27] __sys_sendto+0x564/0x720 [ 1357.835915][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1357.861716][ T27] ? print_irqtrace_events+0x210/0x210 [ 1357.868591][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1357.893054][ T27] __x64_sys_sendto+0xda/0xf0 [ 1357.897779][ T27] do_syscall_64+0x3d/0xb0 [ 1357.921455][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1357.927386][ T27] RIP: 0033:0x7fba96915a9c [ 1357.941338][ T27] RSP: 002b:00007ffccc9a97f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1357.950010][ T27] RAX: ffffffffffffffda RBX: 00007fba9756b620 RCX: 00007fba96915a9c [ 1357.971461][ T27] RDX: 0000000000000034 RSI: 00007fba9756b670 RDI: 0000000000000005 [ 1357.979461][ T27] RBP: 0000000000000000 R08: 00007ffccc9a9844 R09: 000000000000000c [ 1358.002989][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 1358.010992][ T27] R13: 00007ffccc9a98b8 R14: 00007fba9756b670 R15: 0000000000000000 [ 1358.019519][ T27] [ 1358.033819][ T27] INFO: task syz-executor.1:28774 blocked for more than 147 seconds. [ 1358.042061][ T27] Not tainted 5.15.147-syzkaller #0 [ 1358.048091][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1358.057251][ T27] task:syz-executor.1 state:D stack:21112 pid:28774 ppid: 1 flags:0x00004006 [ 1358.066838][ T27] Call Trace: [ 1358.070132][ T27] [ 1358.073433][ T27] __schedule+0x12c4/0x45b0 [ 1358.077971][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1358.084264][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1358.093194][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1358.098428][ T27] schedule+0x11b/0x1f0 [ 1358.123101][ T27] schedule_preempt_disabled+0xf/0x20 [ 1358.128518][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1358.151358][ T27] ? devlink_register+0x17/0x80 [ 1358.156302][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1358.171358][ T27] ? kmem_cache_alloc_trace+0x143/0x290 [ 1358.176988][ T27] ? devlink_resource_register+0xc2/0x310 [ 1358.201378][ T27] ? devlink_resource_register+0x1db/0x310 [ 1358.207231][ T27] mutex_lock_nested+0x17/0x20 [ 1358.221337][ T27] devlink_register+0x17/0x80 [ 1358.226054][ T27] nsim_dev_probe+0x437/0x9f0 [ 1358.230817][ T27] ? nsim_dev_port_del+0x110/0x110 [ 1358.251450][ T27] ? kernfs_put+0x45a/0x4a0 [ 1358.256031][ T27] ? kernfs_create_link+0x186/0x1f0 [ 1358.261247][ T27] ? sysfs_do_create_link_sd+0xdd/0x100 [ 1358.276908][ T27] ? driver_sysfs_add+0x22f/0x240 [ 1358.291341][ T27] ? really_probe+0x12b/0xb60 [ 1358.296059][ T27] ? nsim_bus_exit+0x250/0x250 [ 1358.300891][ T27] really_probe+0x24e/0xb60 [ 1358.321379][ T27] __driver_probe_device+0x1a2/0x3d0 [ 1358.326710][ T27] driver_probe_device+0x50/0x420 [ 1358.343111][ T27] __device_attach_driver+0x2b9/0x500 [ 1358.348529][ T27] ? deferred_probe_work_func+0x230/0x230 [ 1358.365670][ T27] bus_for_each_drv+0x183/0x200 [ 1358.370597][ T27] ? subsys_find_device_by_id+0x310/0x310 [ 1358.388017][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1358.393619][ T27] __device_attach+0x359/0x570 [ 1358.398407][ T27] ? kobject_uevent_env+0x36a/0x8d0 [ 1358.407777][ T27] ? device_attach+0x20/0x20 [ 1358.414175][ T27] ? kobject_uevent_env+0x36a/0x8d0 [ 1358.421740][ T27] bus_probe_device+0xba/0x1e0 [ 1358.426528][ T27] ? device_add+0xab9/0xfd0 [ 1358.431191][ T27] device_add+0xb48/0xfd0 [ 1358.436157][ T27] new_device_store+0x471/0x910 [ 1358.441039][ T27] ? nsim_num_vf+0x50/0x50 [ 1358.445854][ T27] ? sysfs_kf_write+0x181/0x2a0 [ 1358.450721][ T27] ? sysfs_kf_read+0x300/0x300 [ 1358.461667][ T27] kernfs_fop_write_iter+0x3a2/0x4f0 [ 1358.492526][ T27] vfs_write+0xacf/0xe50 [ 1358.511449][ T27] ? file_end_write+0x250/0x250 [ 1358.516347][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1358.542623][ T27] ? __fdget_pos+0x2d2/0x380 [ 1358.547274][ T27] ksys_write+0x1a2/0x2c0 [ 1358.559834][ T27] ? print_irqtrace_events+0x210/0x210 [ 1358.572621][ T27] ? __ia32_sys_read+0x80/0x80 [ 1358.577427][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1358.601415][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1358.606654][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1358.621441][ T27] do_syscall_64+0x3d/0xb0 [ 1358.625901][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1358.641396][ T27] RIP: 0033:0x7fc3100dbaef 02:58:13 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1358.645846][ T27] RSP: 002b:00007fff9065e530 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1358.671509][ T27] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fc3100dbaef [ 1358.679524][ T27] RDX: 0000000000000003 RSI: 00007fff9065e580 RDI: 0000000000000005 [ 1358.711410][ T27] RBP: 00007fc310129045 R08: 0000000000000000 R09: 00007fff9065e387 [ 1358.719526][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1358.741596][ T27] R13: 00007fff9065e580 R14: 00007fc310d34620 R15: 0000000000000003 [ 1358.749627][ T27] [ 1358.764518][ T27] INFO: task syz-executor.5:29125 blocked for more than 148 seconds. [ 1358.772754][ T27] Not tainted 5.15.147-syzkaller #0 [ 1358.778477][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1358.803043][ T27] task:syz-executor.5 state:D stack:26624 pid:29125 ppid: 1 flags:0x00004006 [ 1358.812396][ T27] Call Trace: [ 1358.815676][ T27] [ 1358.818611][ T27] __schedule+0x12c4/0x45b0 [ 1358.831416][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1358.837387][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1358.843026][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1358.848236][ T27] schedule+0x11b/0x1f0 [ 1358.852455][ T27] schedule_preempt_disabled+0xf/0x20 [ 1358.857825][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1358.871353][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1358.876500][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1358.891359][ T27] mutex_lock_nested+0x17/0x20 [ 1358.896158][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1358.901097][ T27] ? reacquire_held_locks+0x660/0x660 [ 1358.907453][ T27] ? rtnetlink_bind+0x80/0x80 [ 1358.921343][ T27] ? is_bpf_text_address+0x24f/0x260 [ 1358.926658][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1358.931787][ T27] ? __kernel_text_address+0x94/0x100 [ 1358.937158][ T27] ? unwind_get_return_address+0x49/0x80 [ 1358.950842][ T27] ? arch_stack_walk+0xf3/0x140 [ 1358.955824][ T27] ? mark_lock+0x98/0x340 [ 1358.960174][ T27] ? mark_lock+0x98/0x340 [ 1358.964561][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1358.969793][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1358.991572][ T27] ? rtnetlink_bind+0x80/0x80 [ 1358.996288][ T27] ? netlink_ack+0xb10/0xb10 [ 1359.000894][ T27] netlink_unicast+0x7b6/0x980 [ 1359.005761][ T27] ? netlink_detachskb+0x90/0x90 [ 1359.010702][ T27] ? 0xffffffff81000000 [ 1359.021340][ T27] ? __check_object_size+0x300/0x410 [ 1359.026677][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1359.033466][ T27] netlink_sendmsg+0xa30/0xd60 [ 1359.038261][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1359.051347][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1359.056309][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1359.069144][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1359.081334][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1359.086564][ T27] __sys_sendto+0x564/0x720 [ 1359.091079][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1359.101349][ T27] ? print_irqtrace_events+0x210/0x210 [ 1359.106882][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1359.111965][ T27] __x64_sys_sendto+0xda/0xf0 [ 1359.116659][ T27] do_syscall_64+0x3d/0xb0 [ 1359.121078][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1359.151381][T26745] Bluetooth: hci16: command 0x041b tx timeout [ 1359.159781][ T27] RIP: 0033:0x7fa923f1ba9c [ 1359.173105][ T27] RSP: 002b:00007ffe1963fbf0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1359.201591][ T27] RAX: ffffffffffffffda RBX: 00007fa924b71620 RCX: 00007fa923f1ba9c [ 1359.209613][ T27] RDX: 0000000000000028 RSI: 00007fa924b71670 RDI: 0000000000000003 [ 1359.231613][ T27] RBP: 0000000000000000 R08: 00007ffe1963fc44 R09: 000000000000000c [ 1359.239622][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1359.271358][ T27] R13: 0000000000000000 R14: 00007fa924b71670 R15: 0000000000000000 [ 1359.283122][ T27] [ 1359.286185][ T27] [ 1359.286185][ T27] Showing all locks held in the system: [ 1359.311455][ T27] 1 lock held by khungtaskd/27: [ 1359.317641][ T27] #0: ffffffff8c91f220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1359.338158][ T27] 2 locks held by kworker/u4:1/144: [ 1359.347120][ T27] 2 locks held by getty/3262: [ 1359.354384][ T27] #0: ffff888023f92098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1359.369042][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1359.387327][ T27] 5 locks held by kworker/u4:6/6979: [ 1359.396445][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1359.411671][ T27] #1: ffffc90004577d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1359.427850][ T27] #2: ffffffff8d9ce810 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1359.442773][ T27] #3: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1359.459035][ T27] #4: ffffffff8c9237e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 02:58:14 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1359.476571][ T27] 2 locks held by kworker/0:33/26743: [ 1359.484815][ T27] #0: ffff888011c72538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1359.501109][ T27] #1: ffffc90003af7d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1359.518520][ T27] 3 locks held by kworker/0:35/26746: [ 1359.531357][ T27] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1359.542241][ T27] #1: ffffc90003b37d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1359.558615][ T27] #2: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1359.570159][ T27] 3 locks held by kworker/0:41/26752: [ 1359.581359][ T27] #0: ffff88814a16b138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1359.601937][ T27] #1: ffffc90003be7d20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1359.617737][ T27] #2: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xcc/0x1720 [ 1359.638593][ T27] 3 locks held by kworker/0:42/26753: [ 1359.649373][ T27] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1359.671432][ T27] #1: ffffc90003bf7d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1359.682191][ T27] #2: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1359.701703][ T27] 1 lock held by syz-executor.5/28368: [ 1359.707180][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1359.721524][ T27] 1 lock held by syz-executor.3/28540: [ 1359.727011][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1359.761375][ T27] 2 locks held by syz-executor.4/28558: [ 1359.766940][ T27] #0: ffffffff8da39c90 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 [ 1359.781572][ T27] #1: ffffffff8da39b48 (genl_mutex){+.+.}-{3:3}, at: genl_rcv_msg+0x124/0x14a0 [ 1359.801453][ T27] 6 locks held by syz-executor.0/28571: [ 1359.807065][ T27] #0: ffffffff8da39c90 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 [ 1359.821930][ T27] #1: ffff888078614690 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}, at: netlink_dump+0xd0/0xc40 [ 1359.841381][ T27] #2: ffffffff8da39b48 (genl_mutex){+.+.}-{3:3}, at: genl_lock_dumpit+0x47/0x90 [ 1359.850610][ T27] #3: ffffffff8d9ff9e8 (devlink_mutex){+.+.}-{3:3}, at: devlink_nl_cmd_port_get_dumpit+0xb5/0x5d0 [ 1359.881431][ T27] #4: ffff88801eb94250 (&devlink->lock){+.+.}-{3:3}, at: devlink_nl_cmd_port_get_dumpit+0x200/0x5d0 [ 1359.901367][ T27] #5: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: devlink_nl_port_fill+0x2ab/0x930 [ 1359.911169][ T27] 6 locks held by syz-executor.1/28774: [ 1359.931846][ T27] #0: ffff8880252ba460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1359.971349][ T27] #1: ffff88801a713888 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1359.981155][ T27] #2: ffff888147ba73a8 (kn->active#234){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1360.021740][ T27] #3: ffffffff8d356c68 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: new_device_store+0x1b0/0x910 [ 1360.041961][ T27] #4: ffff888078617178 (&dev->mutex){....}-{3:3}, at: __device_attach+0x8a/0x570 [ 1360.051243][ T27] #5: ffffffff8d9ff9e8 (devlink_mutex){+.+.}-{3:3}, at: devlink_register+0x17/0x80 [ 1360.070768][ T27] 1 lock held by syz-executor.5/29125: [ 1360.091455][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.111361][ T27] 1 lock held by syz-executor.3/29292: [ 1360.116841][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.151896][ T27] 1 lock held by syz-executor.4/29335: [ 1360.157384][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.181676][ T27] 1 lock held by syz-executor.0/29418: [ 1360.187155][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.201381][ T27] 1 lock held by syz-executor.1/29608: [ 1360.206882][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.228125][ T27] 1 lock held by syz-executor.5/30033: [ 1360.236772][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.253288][ T27] 1 lock held by syz-executor.3/30204: [ 1360.258915][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.278314][ T27] 1 lock held by syz-executor.4/30302: [ 1360.287560][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.302945][ T27] 1 lock held by syz-executor.0/30324: [ 1360.308424][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.327349][ T27] 1 lock held by syz-executor.1/30559: [ 1360.336477][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.351352][ T27] 1 lock held by syz-executor.2/30850: [ 1360.356825][ T27] 1 lock held by syz-executor.2/30891: [ 1360.371974][ T27] 3 locks held by syz-executor.2/30897: [ 1360.377675][ T27] 2 locks held by syz-executor.2/30901: [ 1360.387285][ T27] 3 locks held by syz-executor.2/30905: [ 1360.401391][ T27] 2 locks held by syz-executor.2/30908: [ 1360.407119][ T27] 4 locks held by syz-executor.2/30979: [ 1360.413113][ T27] 3 locks held by syz-executor.2/30996: [ 1360.418667][ T27] 2 locks held by syz-executor.2/30999: [ 1360.424550][T19790] Bluetooth: hci17: command 0x0409 tx timeout [ 1360.441375][ T27] 3 locks held by syz-executor.2/31003: [ 1360.446947][ T27] 1 lock held by syz-executor.5/31006: [ 1360.461401][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.470856][ T27] 2 locks held by syz-executor.2/31010: [ 1360.476860][ T27] 2 locks held by syz-executor.2/31026: [ 1360.491413][ T27] 2 locks held by syz-executor.2/31029: [ 1360.496979][ T27] 2 locks held by syz-executor.2/31033: [ 1360.503239][ T27] 3 locks held by syz-executor.2/31042: 02:58:15 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0x35, 0x1, 0x400, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0]}, 0x40) openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) r1 = syz_clone(0x100000, &(0x7f0000000040)="fcfa3b26133a246567596e7daf1ecdcc07ee2e2497d4590f975deeff8a8847d0c007058f8eeab77abb380ba1588efebf", 0x30, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="98867cdaa14e44faa50d6f4f350ac935dee0cdbefb61d328ca541a688c0102f33fad01cf569aaf5c2f1f7ba52073e9ecd2ab565563dcba5817cb34cb9e6f1ab5565de2d65d579c5eb6ef3afb0603251e796dfaf79f2e5d12a7ea174273986c94c43832386aa5bd0d4168636d155ae0f57e8f044e07e359e02b4647feff80d97ff0501aed4cc54001b8f23ae19d6e16827697e6f17c8c4de314438fac0815f2a0823cafad35e52290acff10120fbbdedc2769856d6d1b25a7887958d2017fa59f250c") write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) [ 1360.521427][ T27] 2 locks held by syz-executor.2/31045: [ 1360.552655][ T27] 2 locks held by syz-executor.2/31048: [ 1360.558318][ T27] 3 locks held by syz-executor.2/31051: [ 1360.564287][ T27] 2 locks held by syz-executor.2/31068: [ 1360.569834][ T27] 2 locks held by syz-executor.2/31175: [ 1360.581397][ T27] 2 locks held by syz-executor.2/31179: [ 1360.586960][ T27] 1 lock held by syz-executor.3/31181: [ 1360.593517][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.603253][ T27] 2 locks held by syz-executor.2/31185: [ 1360.609045][ T27] 2 locks held by syz-executor.2/31188: [ 1360.615029][ T27] 3 locks held by syz-executor.2/31192: [ 1360.620587][ T27] 2 locks held by syz-executor.2/31196: [ 1360.626558][ T27] 1 lock held by syz-executor.4/31197: [ 1360.632273][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.651358][ T27] 1 lock held by syz-executor.0/31205: [ 1360.656862][ T27] #0: ffffffff8d9da3c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1360.666799][ T27] 2 locks held by syz-executor.2/31208: [ 1360.672770][ T27] [ 1360.675140][ T27] ============================================= [ 1360.675140][ T27] [ 1360.684033][ T27] NMI backtrace for cpu 1 [ 1360.688357][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.147-syzkaller #0 [ 1360.696334][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1360.706392][ T27] Call Trace: [ 1360.709667][ T27] [ 1360.712594][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1360.717280][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1360.722932][ T27] ? panic+0x84d/0x84d [ 1360.727008][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1360.732121][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1360.737052][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1360.741928][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1360.748105][ T27] ? _printk+0xd1/0x111 [ 1360.752267][ T27] ? panic+0x84d/0x84d [ 1360.756339][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1360.761183][ T27] ? panic+0x84d/0x84d [ 1360.765246][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1360.770265][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1360.776376][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1360.782366][ T27] watchdog+0xe72/0xeb0 [ 1360.786589][ T27] kthread+0x3f6/0x4f0 [ 1360.790656][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1360.795675][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1360.800269][ T27] ret_from_fork+0x1f/0x30 [ 1360.804703][ T27] [ 1360.808115][ T27] Sending NMI from CPU 1 to CPUs 0: [ 1360.813510][ C0] NMI backtrace for cpu 0 [ 1360.813521][ C0] CPU: 0 PID: 2946 Comm: syslogd Not tainted 5.15.147-syzkaller #0 [ 1360.813536][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1360.813544][ C0] RIP: 0033:0x7ff946c23c43 [ 1360.813557][ C0] Code: fe ff ff 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 49 89 c8 31 c9 e9 ce fc ff ff 41 57 41 89 c9 89 d0 41 56 49 89 f6 41 55 <45> 31 ed 41 54 45 31 e4 55 53 48 83 ec 28 49 8b 48 08 48 89 7c 24 [ 1360.813568][ C0] RSP: 002b:00007ffe98abb710 EFLAGS: 00000246 [ 1360.813581][ C0] RAX: 000000000000000a RBX: 00007ffe98abb790 RCX: 0000000000000000 [ 1360.813591][ C0] RDX: 000000000000000a RSI: 00007ffe98abb790 RDI: 000055a6dc4de951 [ 1360.813601][ C0] RBP: 00007ff946b5c300 R08: 00007ff946d8c3a0 R09: 0000000000000000 [ 1360.813610][ C0] R10: 00007ff946e4f3a3 R11: 0000000000000246 R12: 000055a6dc4de9ac [ 1360.813620][ C0] R13: 000055a6dc4de950 R14: 00007ffe98abb790 R15: 00007ff946e8da80 [ 1360.813630][ C0] FS: 00007ff946b5c380 GS: 0000000000000000 [ 1360.932464][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1360.939312][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.147-syzkaller #0 [ 1360.947302][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1360.957360][ T27] Call Trace: [ 1360.960642][ T27] [ 1360.963567][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1360.968248][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1360.973876][ T27] ? panic+0x84d/0x84d [ 1360.977948][ T27] panic+0x318/0x84d [ 1360.981845][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1360.987492][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1360.993663][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1360.998869][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1361.004953][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1361.011121][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1361.017285][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1361.023448][ T27] watchdog+0xeb0/0xeb0 [ 1361.027613][ T27] kthread+0x3f6/0x4f0 [ 1361.031678][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1361.036700][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1361.041289][ T27] ret_from_fork+0x1f/0x30 [ 1361.045715][ T27] [ 1361.048989][ T27] Kernel Offset: disabled [ 1361.053304][ T27] Rebooting in 86400 seconds..